New! View global litigation for patent families

US20060184682A1 - Method and device for scanning a plurality of computerized devices connected to a network - Google Patents

Method and device for scanning a plurality of computerized devices connected to a network Download PDF

Info

Publication number
US20060184682A1
US20060184682A1 US11396602 US39660206A US2006184682A1 US 20060184682 A1 US20060184682 A1 US 20060184682A1 US 11396602 US11396602 US 11396602 US 39660206 A US39660206 A US 39660206A US 2006184682 A1 US2006184682 A1 US 2006184682A1
Authority
US
Grant status
Application
Patent type
Prior art keywords
computerized
data
device
devices
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11396602
Other versions
US8566939B2 (en )
Inventor
Ron Suchowski
Hilik Kotler
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Promisec Ltd
Original Assignee
Promisec Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/04Architectural aspects of network management arrangements
    • H04L41/046Aspects of network management agents
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/14Multichannel or multilink protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Abstract

Some embodiments of the invention relate to a method and a device for scanning a plurality of computerized devices connected to a network. According to some embodiments of the invention, a plurality of computerize devices to be scanned may be provided. A plurality of threads of an agentless module may be provided for scanning the plurality of computerized devices. Each of the plurality of threads of the agentless module may be associated with at least one of the plurality of computerized devices. The plurality of threads of the agentless module may be utilized to configure a plurality of remote access processes to scan in parallel and without using agents at least two of the plurality of remote computerized devices.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • [0001]
    This application is a Continuation-In-Part of U.S. patent application Ser. No. 11/226,451 filed on Sep. 15, 2005 which is hereby incorporated by reference in its entirety. This application further claims the benefit of the following US Provisional Applications: U.S. Provisional Application No. 60/672,050 filed on Apr. 18, 2005; U.S. Provisional Application No. 60/672,072 filed on Apr. 18, 2005; U.S. Provisional Application No. 60/672,045 filed on Apr. 18, 2005; and U.S. Provisional Application No. 60/672,046 filed on Apr. 18, 2005, and also the benefit of an Israeli Patent Application No. IL164402 filed on Oct. 5, 2004, which are all hereby incorporated by reference.
  • FIELD OF THE INVENTION
  • [0002]
    The present invention generally relates to the field of information security. More specifically, the present invention relates to scanning of computerized devices connected to a network.
  • BACKGROUND OF THE INVENTION
  • [0003]
    Information and digital information in particular, is at the heart of most organizations today. Regrettably, nowadays, information systems are under constant threat, and precious data is often at risk of being corrupted or being disclosed, or even stolen by an unauthorized party. The financial ramifications of these risks are too great to be ignored. Unfortunately, existing information security solutions are not able to provide a comprehensive solution, enabling reliable and continuous protection against existing threats compromising the organizational data.
  • [0004]
    The reliance upon the Internet for carrying different kinds of communications, both within the organizations' networks and with the outside world (public, remote sites, business partners etc.), together with the introduction into the market and the proliferation of many sophisticated miniature storage devices (e.g., USB attachable devices used as disks) and other advanced technologies, present new security challenges. Most existing IT security solutions are essentially improvements of existing solutions, and are based on the assumption that threats come from external sources (e.g., the Internet). Therefore most of the present IT security solutions regard entities within the organization's network as “trusted”, whereas entities outside the organizations network are regarded as “untrusted”. The increasing amount of threats making use of simple means and methods for creating backdoors into the internal organizational network is evidence of a fundamental weakness of the peripheral defense approach, which includes for example, all existing gateway security products (e.g., firewalls, anti virus, content inspection, IDS/IPS and other filters). Indeed, world famous research groups recently estimated that over 80% of incidents of breaching organizational information security, originate from inside an organization itself (maliciously or due to lack of awareness); therefore, it is important to provide protection against external threats and internal ones (e.g., employees, contractors, etc.) and to provide security personnel with a solution, allowing them to effectively monitor activities involving computers in internal networks (for example, monitoring compliance with information security policies) and to enforce a security policy on these computers.
  • [0005]
    Attempts have been made to fill part of the security void described above. For example, some existing solutions rely on agent applications which must be installed on each device which is to be scanned and then must be managed on each of the devices where it is installed. An agent based solution requires that each computerized device, which is to be allowed to communicate with the organization's networks, be installed with the appropriate agent application. The installations, whether they are automatic, semi-automatic or manual, require substantial human resources and may be quite time consuming. An agent installation on any number of servers and workstations may fail to operate without such failure being noticed, causing a severe and undetected security breach.
  • [0006]
    A different group of information security tools includes various vulnerability scanners. Vulnerability scanners are typically used to detect unnecessary/unauthorized services, such as open ports, for example, and other vulnerabilities. Vulnerability scanners are normally not suitable for addressing all threats on the Operating System level as well as threats which operate on the application level.
  • [0007]
    When attending to the potential security threats on the computerized devices within the organization's network, it is important to be able to provide a relatively short turnaround time so that if a potential threat develops or is created somewhere in the network, it is dealt with before any serious damage is caused. For those threats which can potentially cause great damage within a very short period of time, it is important to provide an efficient security solution having a relatively very short turnaround time. The number of computerized devices which need to be checked is, in many cases, quite large and the turnaround time of a centralized solution (not depending on agents) according to the prior art may not acceptable, even if the number of threats being addressed is rather small. If in-between cycles a computerized device is exposed to potential threats, the network is not reasonably protected from serious damage due to security breaches.
  • [0008]
    US Patent Application Publication No. 2005/0097199 allegedly discloses a method and a system for scanning network devices connected to a network by detecting connection of a first network device to the network and performing remote scanning of the first network device in response to detection of the first network device. Publication '199 further allegedly discloses performing the scan without using agents. In publication '199 it is stated that there are numerous drawbacks associated with a scanning technique which is based upon a periodic remote-scan of networked computers to discover and repair security threats, and it is thus suggested to scan a networked computer in response to detection of the computer's connection or attachment to the network.
  • SUMMARY OF THE INVENTION
  • [0009]
    There is a need for a system, method and device to enable efficient and robust scanning of a plurality of computerized devices, without using agents. There is a need for a system, method and device which enable efficient and robust periodic agentless scanning of a plurality of computerized devices. There is a need for a system, method and device which enable efficient and robust scanning of a plurality of computerized devices, and which provides a relatively short turnaround time with respect to the scanning of the plurality of computerized devices, without using agents. There is a need for a system, method and device which enable remote scanning of a plurality of remote computerized devices in parallel and without using agents. There is a further need for a system, method and device which enable robust and efficient remote agentless and parallel scanning of a plurality of computerized devices at various times during their connection to the network.
  • [0010]
    There is a further need for a system, method and device for enforcing a security policy in parallel on a plurality of computerized devices within a network and without using agents. The system, method or device is required to enable automatic activation and/or on demand activation, and may operate either in conjunction with a preliminary scanning of the computerized devices or may be independent from data with respect to the current status of the computerized devices.
  • [0011]
    Some embodiments of the invention relate to a method of scanning a plurality of computerized devices connected to a network. According to some embodiments of the invention, a plurality of computerize devices to be scanned may be provided. A plurality of threads of an agentless module may be provided for scanning the plurality of computerized devices. Each of the plurality of threads of the agentless module may be associated with at least one of the plurality of computerized devices. The plurality of threads of the agentless module may be utilized to configure a plurality of remote access processes to scan in parallel and without using agents at least two of the plurality of remote computerized devices.
  • [0012]
    According to further embodiments of the invention each of the plurality of threads of the agentless module may be utilized to configure one or more remote access processes to scan a computerized device associated with the thread.
  • [0013]
    According to some embodiments of the invention, the number of threads to be provided may be determined in accordance with a predefined criterion.
  • [0014]
    According to some embodiments of the invention, each of the plurality of computerized devices to be scanned may be provided with data with respect to one or more data items to be scanned thereon, and the plurality of threads of the agentless module may be utilized to configure a plurality of remote access processes to scan in parallel and without using agents at least two of the plurality of remote computerized devices in accordance with one or more data items associated with the computerized devices. According to some embodiments of the invention, each thread of the agentless module may be associated with a data item to be scanned on a computerized device associated with the thread.
  • [0015]
    According to some embodiments of the invention, scanning a computerized device comprises one or more of the following: scanning the remote computerized device for data in respect of a data item associated therewith; comparing data on a computerized device in respect of a data item in accordance with a security setting associated with the data item; and updating data on a computerized device in respect of a data item in accordance with a security setting associated with the data item.
  • [0016]
    According to some embodiments of the invention, a data item may be one from a group including: a configuration, an application, a file, a process, a service, a registry key, a registry value.
  • [0017]
    According to some embodiments of the invention, the initiation of a scanning of the plurality of computerized devices may be insensitive to a new attachment of any of the plurality of computerized devices to the network. According to further embodiments of the invention, the initiation of a scanning of the plurality of computerized devices may be performed automatically in response to one or more of the following: a completion of a previous scan, an event occurring on a computerized device connected to the network, a predefined schedule.
  • [0018]
    Further embodiments of the invention relate to a device for scanning a plurality of computerized devices connected to a network. According to some embodiments of the invention, the device may include a scanning module and an agentless module. According to some embodiments of the invention, the scanning module may be adapted to provide data with respect to a plurality of computerized device to be scanned. The agentless module may be adapted to provide a plurality of threads. According to some embodiments of the invention, the scanning module may be adapted to utilize the plurality of threads of the agentless module to configure a plurality of remote access processes to scan in parallel and without using agents at least two of the plurality of remote computerized devices.
  • [0019]
    According to a further aspect of the invention, there is provided a method, a system and a device for enforcing a security policy on a plurality of computerized devices within an organization's network. According to some embodiments of the invention, a method of enforcing a security policy on a plurality of computerized devices within an organization's network may include designating a data item and an associated action for each of the plurality of computerized devices. A plurality of threads of an agentless module may be provided, and each thread may be associated with at least one of the plurality of computerized devices and with at least a data item and an associated action designated for the computerized device. Each thread of the agentless module may be adapted to configure a remote access process in a manner to cause each of the remote computerized device(s) associated with the thread to perform the designated action in respect of data corresponding to the designated data item on the remote computerized device(s), contingent upon there being data corresponding to the designated data item on the computerized device or the lack thereof.
  • [0020]
    According to further embodiments of the invention, a device for enforcing a security policy on a plurality of computerized devices within an organization's network may include an enforcement module and an agentless module. According to some embodiments of the invention, the enforcement module may be adapted to receive data designating a data item and an associated action for each of the plurality of computerized devices. The agentless module may be adapted to provide a plurality of threads, each thread being associated with at least one of the plurality of computerized devices, and in respect of each computerized device, with at least a data item and an associated action designated thereto. According to some embodiments of the invention, each thread of the agentless module may be adapted configure a remote access process in a manner to cause each of the remote computerized device(s) associated with the thread to perform the designated action in respect of data corresponding to the designated data item on the remote computerized device(s), contingent upon there being data corresponding to the designated data item on the computerized device or the lack thereof.
  • [0021]
    According to still further embodiments of the invention, a system for enforcing a security policy on a plurality of computerized devices within an organization's network may include a plurality of computerized devices and an operator's computer. According to some embodiments of the invention, the operator's computer may include enforcement module and an agentless module. According to some embodiments of the invention, the enforcement module may be adapted to receive data designating a data item and an associated action for each of the plurality of computerized devices. The agentless module may be adapted to provide a plurality of threads, each thread being associated with at least one of the plurality of computerized devices, and in respect of each computerized device, with at least a data item and an associated action designated thereto. According to some embodiments of the invention, each thread of the agentless module may be adapted configure a remote access process in a manner to cause each of the remote computerized device(s) associated with the thread to perform the designated action in respect of data corresponding to the designated data item on the remote computerized device(s), contingent upon there being data corresponding to the designated data item on the computerized device or the lack thereof.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0022]
    In order to understand the invention and to see how it may be carried out in practice, a preferred embodiment will now be described, by way of non-limiting example only, with reference to the accompanying drawings, in which:
  • [0023]
    FIG. 1 is a block diagram illustration of a device for scanning a plurality of computerized devices connected to a network, according to some embodiments of the invention;
  • [0024]
    FIG. 2 is a block diagram illustration of a typical network of an organization including a device for scanning a plurality of computerized devices connected to a network, according to some embodiments of the invention;
  • [0025]
    FIG. 3 is a block diagram illustration of a device for enforcing a security policy on a plurality of computerized devices connected to a network, according to some embodiments of the invention;
  • [0026]
    FIG. 4 an lustration of a portion of a table which may be used in accordance with some embodiments of the invention for enabling the enforcement of a security policy on a plurality of computerized devices connected to a network; and
  • [0027]
    FIG. 5 is a flow chart illustration of a method of enforcing a security policy on a plurality of computerized devices connected to a network, according to some embodiments of the present invention.
  • [0028]
    It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements.
  • DETAILED DESCRIPTION OF THE INVENTION
  • [0029]
    In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures and components have not been described in detail so as not to obscure the present invention.
  • [0030]
    Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions utilizing terms such as “processing”, “computing”, “calculating”, “determining”, “generating”, “assigning” or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulate and/or transform data represented as physical, such as electronic, quantities within the computing system's registers and/or memories into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices.
  • [0031]
    Embodiments of the present invention may include apparatuses for performing the operations herein. This apparatus may be specially constructed for the desired purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs) electrically programmable read-only memories (EPROMs), electrically erasable and programmable read only memories (EEPROMs), magnetic or optical cards, or any other type of media suitable for storing electronic instructions, and capable of being coupled to a computer system bus.
  • [0032]
    The processes and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform the desired method. The desired structure for a variety of these systems will appear from the description below. In addition, embodiments of the present invention are not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the inventions as described herein.
  • [0033]
    Throughout the specification and the claims the term “computerized device” or the like shall be used to mean any computer or computer-like device with networking capabilities, unless stated otherwise. According to some embodiments of the invention, a computerized device includes, but is not limited to, a personal computer, a server, a network printer, a wireless device (a cellular telephone, for example), a Smartphone, a digital personal assistant, an access point, a workstation, a minicomputer, a mainframe computer, a network infrastructure device.
  • [0034]
    Throughout the specification and the claims the term “network” shall be used to mean any group of computerized devices connected together, unless stated otherwise. Networks of computerized devices are well known. According to some embodiments of the invention, a network may include, but is not limited to, the Internet and any portion thereof, private networks, virtual private networks (VPNs), etc. The computerized devices may be connected to the network via one or more of the following: standard telephone lines, LAN, WAN links (for example, T1, T3, 56 kb, X.25), broadband connections (ISDN, Frame Relay, ATM), wireless connections, or through any other known in the present or yet to be devised in the future network connection. In addition, any suitable communication protocol may be used to enable the communication between the computerized devices within the network.
  • [0035]
    Reference is now made to FIG. 1, which is a block diagram illustration of a device for scanning a plurality of computerized devices connected to a network, according to some embodiments of the present invention. In accordance with some embodiments of the invention, a device 100 for scanning a plurality of computerized devices connected to a network may include a scanning module 120 and an agentless module 130. In accordance with some embodiments of the present invention, the scanning module 120 may be operatively connected to the agentless module 130.
  • [0036]
    The scanning module 120 may be adapted to provide a plurality of computerized devices to be scanned. According to some embodiments of the invention, the scanning module 120 may be adapted to provide for each of the computerized devices to be scanned identification data, such as for example, an IP address associated with the computerized device, a host name associated with the computerized device, or any other suitable identification. According to some embodiments of the invention, the computerized devices to be scanned may be selected by a user, for example, by specifying a range of IP addresses to be scanned. According to further embodiments of the invention, the list of computerized devices to be scanned may be obtained from other sources, such as a prime domain controller (PDC), an active directory (AD) and/or various kinds of files from which various data with respect to computerized devices to be scanned may be imported. According to further embodiments of the invention, an operator of the device 100 may utilize a user interface 150 to select the computerized devices to be scanned, for example, from amongst the computerized devices provided by one or more of the sources mentioned above.
  • [0037]
    According to some embodiments of the invention, a computerized device is to be scanned if it is in the list of computerized devices to be scanned. According to further embodiments of the invention, the device 100 is not aware of or sensitive to new attachments to the network for purposes of scanning the computerized device and particularly for purposes of initiating a scan of the computerized device (nor is any of its components). According to some embodiments of the invention, as part of scanning a computerized device and in order to verify that a computerized device is currently connected to the network, one or more pings may be sent to the computerized device to verify that it is in communication with the network. The device is not sensitive not is it aware of a new attachment of a computerized device to the network and particularly, does not trigger a scan in response to such a new attachment. Rather according to some embodiments of the invention, the device 100 may be adapted to initiate a scanning of a plurality of computerized devices periodically, for example, every certain amount of time. Such a scan may be performed in cycles and any single device may be scanned a plurality of times during its connection to the network. Scans may be initiated automatically, for example, substantially immediately after a previous scan is completed. Similarly, according to further embodiments of the invention, the device 100 may be adapted to initiate a scanning of a plurality of computerized devices in response to an event occurring on a computerized device connected to the network, during the connection of the device to the network. For example, the device 100 may be adapted to initiate a scanning of a plurality of computerized devices in response to an alert issued by an anti-virus application with respect to a security threat located on a computerized device connected to the network. Again, in accordance with these embodiments of the invention, the scanning of the computerized devices is initiated while the computerized devices are connected to the network and the initiation of the scan is indifferent to a new attachment of a device to the network.
  • [0038]
    The scanning module may be adapted to utilize or otherwise activate a plurality of threads of the agentless module 130, for example, threads 130A-130C. According to some embodiments of the invention, each of the plurality of threads of the agentless module 130 may be adapted to configure a (one or more) remote access process 160. According to some embodiments of the invention, each of the plurality of threads of the agentless module 130 may be adapted to utilize or otherwise activate a remote access process 160, for example, one or more of remote access processes 160A-160C. According to some embodiments of the invention, a remote access process 160 includes any process which may be configured to scan one or more remote computerized devices without using agents. The remote access processes 160 may include, various and different types of application program interfaces (APIs), and/or tailor-made remote agentless scanning applications or hardware, and may be integrated as part of the device 100 or it may be external to the device 100. It should be noted that as part of some embodiments of the present invention, each of the remote access processes may be adapted to utilize any known or tools yet to be devised in the future, for questioning a remote computerized device, including but not limited to various tools which are a part of some operating systems presently sold on the market. It should also be noted that some embodiments of the present invention are not limited to the use of any particular remote access process.
  • [0039]
    According to some embodiments of the invention, each remote access process 160 utilized by the agentless module to scan one or more computerized devices may be adapted to generate one or more remote queries and/or remote commands and to utilize the communication interface 110 to remotely scan the computerized device. According to further embodiments of the invention, the communication interface 110 may be used by a plurality of remote access processes to scan in parallel, and without using an agent, a plurality of computerized devices. According to yet further embodiments of the invention, one or more of the remote access processes 160 utilized by the threads of the agentless module 130 may be adapted to cause a remote computerized device being scanned to return data in connection with the scanning thereof. According to some embodiments of the invention, scanning a computerized device may include at least obtaining data with respect to data on the computerized device, as will be discussed in further detail below. According to further embodiments of the invention, scanning may include additional activities with respect to data on the computerized device, such as but not limited to, comparing data on the computerized device with a corresponding target data and updating data on the computerized device in accordance with a corresponding target data, as will be discussed in further detail below. An example of a process of comparing data on the computerized device with a corresponding target data, according to some embodiments of the invention, is described in U.S. patent application Ser. No. 11/226451 filed on Sep. 15, 2005.
  • [0040]
    The scanning module 120 may be adapted to associate each thread of the agentless module 130 with at least one of the plurality of computerized devices to be scanned. The scanning module 120 may be adapted to utilize the plurality of threads of the agentless module 130, for example threads 130A-130C, to configure, for example automatically, a plurality of remote access processes 160 to scan in parallel two or more of the plurality of remote computerized devices without using agents. According to further embodiments of the invention, the questioning module 120 may be adapted to configure each thread of the agentless module 130 to utilize one or more remote access processes 160, for example remote access processes 160A-160C, to scan each of the one or more computerized devices assigned thereto.
  • [0041]
    As mentioned above, according to some embodiments of the invention, the scanning module 120 may be adapted to utilize each of the plurality of threads of the agentless module 130 to configure one or more remote access processes 160 to scan one or more remote computerized devices, for example, to scan the computerized devices associated with the thread. The scanning module 120 may be adapted to utilize each of the threads to automatically configure a remote access process 160 to scan the computerized device(s). According to some embodiments of the invention, the scanning module 120 may be adapted to provide each thread with the necessary data to enable the thread to automatically configure the remote access process 160 to scan the computerized device(s), as will be described in further detail below.
  • [0042]
    According to some embodiments of the invention, the scanning module 120 may be adapted to utilize a plurality (two or more) of the threads of the agentless module 130 to automatically configure and utilize a plurality (two or more) of remote access processes 160 in a manner to cause two or more computerized devices to be scanned in parallel. According to some embodiments of the invention, the threads of agentless module 130 may be utilized in a manner to cause the plurality of remote access processes 160 to scan in parallel at least two of the plurality of remote computerized devices as part of scanning the plurality of computerized devices. According to further embodiments of the invention, the scanning module 120 may be adapted to utilize a plurality (two or more) of threads of the agentless module 130 in parallel, and according to still further embodiments of the invention, the plurality (two or more) of threads of the agentless module 130 may be utilized in a manner to automatically configure and utilize in parallel a plurality (two or more) of remote access processes 160. Thus, according to some embodiments of the invention, the device 100 for scanning a plurality of computerized devices connected to a network may enable the scanning of two or more computerized devices in parallel. According to some embodiments of the invention, a plurality of threads of the agentless module 130 may be utilized for enabling the scanning in parallel of a substantially large number of computerized devices. It would be appreciated, that according to some embodiments of the invention, utilizing a plurality of threads of the agentless module 130 in a manner to enable parallel scanning of a substantially large number of computerized devices may provide a relatively short turnaround time for scanning the plurality of computerized devices. According to some embodiments of the invention, the scanning module 120 may be adapted to cause the scanning of the computerized devices to repeat the scanning of the plurality of computerized devices or of some of the plurality of computerized devices immediately upon completion of a previous scan or shortly thereafter. It would be appreciated that, according to some embodiments of the invention, a relatively short turnaround time for scanning a plurality of computerized devices connected to the network, for example, a large number of such devices, combined with a relatively narrowly spaced apart scans (high frequency) may enable rapid detection of security threats and ongoing prevention activity, etc. Furthermore, according to some embodiments of the invention, the scanning module 120 may be adapted to correlate the results of the scan performed on the computerized devices and may thus be able to receive a snapshot of a threat developing within the network as well as a snapshot with respect to countermeasures activated against the threat.
  • [0043]
    According to some embodiments of the invention, the scanning module 120 may be adapted to control some aspects of the scanning of the plurality of remote computerized devices. According to some embodiments of the invention, the scanning module 120 may be adapted to determine the number of threads of the agentless module 130 which are to be used for configuring and utilizing the remote access processes 160. The scanning module 120 may be adapted to determine the number of threads of the agentless module 130 which are to be used in accordance with a predefined criterion (or criteria). According to some embodiments of the invention, the scanning module 120 may be adapted to determine the number of threads to be utilized for enabling the scanning of the computerized devices, for example in accordance with one or more of the following: a number of computerized devices to be scanned, a network performance parameter, a desired scanning speed, a connection speed vis-à-vis computerized devices to be scanned, various characteristics of the computerized devices, geographical location of the various computerized devices, statistical data collected in respect of previous scans, a result or results of a previous scan, etc. According to some embodiments of the invention, the scanning module 120 may be adapted to manually provide the number of threads of the agentless module 130 which are to be used for configuring and utilizing the remote access processes 160. As mentioned above, according to some embodiments of the invention, utilizing a large number of threads of the agentless module 130 may enable a relatively large number of computerized devices to be scanned in parallel and may allow for a reduction in the turnaround time with respect to the scanning of the plurality of computerized devices.
  • [0044]
    According to some embodiments of the invention, the number of threads of the agentless module 130 to be utilized may be determined for each scan, or the scanning module 120 may be adapted to update the number of threads to be used only after a certain number of scans, for example, after a predetermined number of scans, or in accordance with another example, in response to various parameters associated with the scan, for example in response to scan performance parameters. According to some embodiments of the invention, the scanning module 120 may be configured to use predefined numbers of threads for different and predefined kinds of scans, and may be adapted to use a predefined number of threads for all scans belonging to a specific kind of scan which is associated with that number of threads.
  • [0045]
    According to some embodiments of the invention, once the scanning module 120 determines what number of threads of the agentless module 120 to utilize in the process of scanning the plurality of computerized devices, the scanning module 120 may be adapted to invoke or otherwise activate the threads, if necessary, and may associate each thread with one or more of the plurality of computerized devices to be scanned. According to some embodiments of the invention, the scanning module 120 may be adapted to associate at least one of the threads of the agentless module 130 with two or more computerized devices. The association of the computerized devices may be performed in accordance with a predefined criterion/a or ad-hoc, for example, in accordance with certain characteristics, parameters or rules, for example, in accordance with certain characteristics, parameters or rules associated with the computerized device, in accordance with parameters associated with a connection to the computerized device, in accordance with various characteristics of the computerized device (for example—type of hardware, operating system), geographical location of the various computerized device, organizational location of the various computerized devices (departments for example), statistical data collected in respect of previous scans, a result or results of a previous scan. According to some embodiments of the invention, in alternative or in addition, the association of the computerized devices may be sensitive to a scanning policy or policies, a number of data items to be scanned, a type of data items to be scanned however, according to other embodiments of the invention, the computerized devices may be substantially evenly divided amongst the available threads of the agentless module 130. In addition, according to some embodiments of the invention, a plurality of computerized devices to be scanned may be inserted to a queue and the scanning module 120 may be adapted to assign computerized devices from the queue, such that the next computerized device in the queue is assigned to the next available thread when it becomes available or to the next available thread which is relevant for scanning the next in queue computerized device for the data item that is to be scanned on that computerized device and/or other criteria. Thus the scanning module may be adapted to assign a computerized device from the queue to a certain thread of the agentless module, when the thread becomes available, for example, when the thread completes a configuration of an associated remote access process or when an associated remote access module becomes available. According to some embodiments of the invention, as part of associating a computerized device with a thread of the agentless module 130, the scanning module 120 may be adapted to provide the thread with identification data in respect of the computerized device. According to some embodiments of the invention, the scanning module 120 may be adapted to re-associate computerized devices to be scanned during a scan, and may transfer a computerized device from one thread of the agentless module 130 to another. The transfer of computerized devices during a scan may be preformed in accordance with a predefined criterion, for example, in accordance with the progress of the scan and/or the load on each thread.
  • [0046]
    The thread(s) of the agentless module 130 may include any necessary logic to enable it, either alone or in cooperation with the scanning module 120, to configure, utilize and manage the operation of the remote access process(es) 160 for scanning the computerized device(s) associated with the thread. The thread(s) of the agentless module 130 either independently or in cooperation with the scanning module 120, may be configured to determine when to utilize, which remote access process 160 to scan which computerized device. According to some embodiments of the invention, the agentless module 130 either independently or in cooperation with the scanning module 120, may be adapted to implement various criteria to determine when to utilize which remote access process 160 to scan which computerized device and may be adapted to utilize various queue management techniques for that purpose. According to some embodiments of the invention, the scanning module 120 may be adapted to configure the agentless module 130 and any of its threads to repeat a scanning cycle after predetermined time periods, at predetermined times, etc. According to further embodiments of the invention, the scan may also be initiated on demand, for example, by an operator. According to some embodiments of the invention, the scanning module 120 may be adapted to configure the agentless module 130 and any of its threads to repeat a scanning cycle substantially immediately upon completion of a previous scanning cycle. According to further embodiments of the invention, the threads of the agentless module 130 may be configured to automatically perform a predefined number of scanning cycles consecutively. According to yet further embodiments of the invention, the scanning module 120 may be adapted to configure the agentless module 130 and any of its threads to perform different kinds of scans consecutively. The agentless module 130 may thus be configured to automatically perform a certain series of scans consecutively, for example one kind of a scan substantially immediately after another kind of scan was completed. According to some embodiments of the invention, each scan may be performed with respect to the same plurality of computerized devices or with respect to different computerized devices, with some overlap between computerized devices or without any overlap.
  • [0047]
    According to some embodiments of the invention, the scanning module 120 may be adapted to provide for each of the plurality of computerized devices to be scanned data with respect to a data item (one or more) to be scanned thereon. The scanning module 120 may be adapted to utilize the plurality of threads of the agentless module 130 to configure the plurality of remote access processes 160 to scan the plurality of computerized devices in accordance with the data items associated with each computerized device. According to some embodiments of the invention, the data items to be scanned on a computerized device may be provided manually, for example via a user interface, selected from a database including a list of data items, or in any other way. According to further embodiments of the invention, one or more of the data items to be scanned on a computerized device may be predefined data items, which the scanning module 120 may be configured, for example, to cause to be scanned as part of each scanning of the computerized device. In accordance with further embodiments of the invention, the scanning module 120 may be adapted to cause different data items to be scanned as part of different scans.
  • [0048]
    According to some embodiments of the invention, a data item may relate to a specific data on a remote computerized device. According to further embodiments of the invention, a data item is one of a group which includes, but is not limited to, a file or an application on a remote computerized device, a process or a service on a remote computerized device and a registry key on a remote computerized device. Examples of data items include for instance, a configuration file on a remote computerized device, a software patch or the lack thereof, an anti-virus application, a registry key associated with a removable mass-storage device, a process which is associated with a security vulnerability while active, a process which is associated with a security vulnerability while inactive. According to some embodiments of the invention, a computerized device may be scanned for a plurality of data items substantially in parallel and without using agents.
  • [0049]
    According to some embodiments of the invention, a data item may be part of a security policy implemented by the scanning module 120. A security policy may include a plurality of data items which are to be scanned on a plurality of remote computerized devices. The scanning module 120 may be adapted to implement a plurality of security policies, for example, different security policies may be implemented in respect of different groups of computerized devices. According to some embodiments of the invention, as part of implementing a security policy, the scanning module 120 may be adapted to configure and utilize a plurality of threads of the agentless module 130 to configure a plurality of remote access processes 160 to scan in parallel and without using agents a plurality of computerized devices in accordance with a security policy associated with the plurality of computerized devices.
  • [0050]
    According to some embodiments of the invention, the scanning module 120 may be adapted to provide in respect of each data item one or more of the following: a path to the data item on a remote computerized device, a file name associated with the data item, a registry key associated with the data item, a registry key value associated with the data item, registry key data associated with the data item, a process, an application or a service name associated with the data item, a security threat with which the data item is associated, associated data items, for example, data items associated with a common security threat, data with respect to the severity of the security threat with which the data item is associated, a scanning priority associated with the data item, an action to be taken in respect of the data item, a condition for implementing an action in respect of the data item, etc. The scanning module 120 may be adapted to use the data in respect of each data item to configure each of the plurality of threads of the agentless module 130, in a manner to enable each thread to configure and utilize a remote access process(es) 160 for scanning the remote computerized device for the data item in accordance with the data in respect thereof.
  • [0051]
    For example, the device 100 for scanning a plurality of computerized devices connected to a network may enable to remotely scan in parallel and without using agents a plurality of computerized devices (two or more) for an antivirus application installed and activated on a remote computerized device. In accordance with a further example, the device 100 for scanning a plurality of computerized devices connected to a network may enable to remotely scan in parallel and without using agents a plurality of computerized devices (two or more) for a file sharing application on a computerized device. As will be discussed in further detail below, the device 100 may be adapted to remotely deactivate the file sharing application on a plurality of computerized devices (two or more) in parallel and without using an agent, and may be adapted in addition to disable and/or remove the file sharing application from the plurality of computerized devices in parallel and without using agents. In accordance with another example of the invention, the device 100 may be adapted to install a patch on a plurality of computerized devices (two or more) connected to a network in parallel and without using agents. In accordance with yet another example, the device 100 for scanning a plurality of computerized devices connected to a network may enable to remotely scan in parallel and without using agents a plurality of computerized devices (two or more) for a registry key or a specific combination of registry keys on a remote computerized device which is/are associated with a removable mass-storage device which is currently attached or which was previously attached to the computerized device. According to some embodiments of the invention, in response to an instruction to prevent a certain security threat on a plurality of computerized devices, the scanning module 120 may be adapted to automatically determine the data items associated with the security threat, and may be further adapted to utilize a plurality of threads of the agentless module 130 to configure a plurality of remote access processes in a manner to cause two or more of the plurality of computerized devices to be scanned in parallel and without using agents for the data items associated with the security threat.
  • [0052]
    According to some embodiments of the invention, the scanning module 120 may be adapted to provide for one or more data items a predefined security setting to enable auditing or updating a remote computerized device in accordance with the predefined security setting. According to some embodiments of the invention, a security policy implemented/enforced by the scanning module 120 may include a security setting for each data item included in the security policy. According to some embodiments of the invention, the scanning module 120 may provide for a data item a security setting associated with the data item. The scanning module 120 may be adapted to provide the security setting to a thread of the agentless module 130 associated with the data item to which the security setting relates.
  • [0053]
    According to some embodiments of the invention, a scanning module 120 may be adapted to utilize a thread of the agentless module 130 to configure one or more remote access processes to audit a specific data item on a remote computerized device without using an agent, in accordance with a security setting associated with the data item. According to further embodiments of the invention, a scanning module 120 may be adapted to utilize a plurality of threads of the agentless module 130 to configure a plurality (two or more) of remote access processes to audit one or more specific data items on a plurality (two or more) of remote computerized devices in parallel and without using an agent. Each data item may be audited in accordance with a security setting associated with the data item. According to some embodiments of the invention, a scanning module 120 may be adapted to utilize a thread of the agentless module 130 to configure one or more remote access processes to update a specific data item on a remote computerized device without using an agent, in accordance with a security setting associated with the data item. According to further embodiments of the invention, a scanning module 120 may be adapted to utilize a plurality of threads of the agentless module 130 to configure a plurality (two or more) of remote access processes to update one or more specific data items on a plurality (two or more) of remote computerized devices in parallel and without using an agent. Each data item may be updated in accordance with a security setting associated with the data item. It would be appreciated that, according to some embodiments of the invention, auditing the computerized devices and updating the computerized devices may be used to achieve compliance with a predefined administrative/security policy. According to some embodiments of the invention, a security policy may include data items and security settings which are part of a “black list” and/or data items and security setting which are part of a “white list”. A list which includes data items and/or security setting in respect of certain data items which are allowed is referred to here by the term “white list”. A white list may be used to specify prohibited data items and/or prohibited security settings by specifying anything outside the “white list” as such.
  • [0054]
    According to some embodiments of the invention, as a result of the scanning of the plurality of computerized devices, a report may be generated based upon the results of the scan. The report may include processed results or it may include the data as it was received from the computerized devices. According to further embodiments of the invention, the report may include only data which may be indicative of a security threat. The report may include additional data with respect to the security threat, such as, for example, data with respect to various characteristics of the threat. According to further embodiments of the invention, the results may be returned to the device 100 for analysis, and the device 100 may automatically initiate actions in response to certain results. For example, the device 100 may be adapted to initiate remedial actions in connection with a detected security threat. According to some embodiments of the invention, the data with respect to the action to be performed may be provided manually, for example by an operator of the device 100, or automatically. According to further embodiments of the invention, the remedial actions may be part of a subsequent remote scan of a plurality of computerized device. According to further embodiments of the invention, the subsequent remote scan may be initiated automatically, for example, in response to the results of the previous scan. According to yet further embodiments of the invention, the subsequent remote scan may be performed in parallel and without using an agent on at least two computerized devices connected to the network.
  • [0055]
    In the above description of some embodiments of the invention reference is made to a scanning module, an agentless module capable of providing a plurality of threads, and remote access processes. It would be appreciated, that according to further embodiments of the invention, two or more of the components discussed herein, and specifically, the scanning module, the agentless module capable of providing a plurality of threads, and the remote access processes may be combined into a single element. Accordingly, some embodiments of the invention relate to an element whose functionality substantially corresponds to the functionality described herein with respect to two or more of the following: the scanning module, the agentless module capable of providing a plurality of threads, and the remote access processes.
  • [0056]
    It should be noted that further details with respect to various embodiments of the invention may be obtained from U.S. application Ser. No. 11/226,451 filed on Sep. 15, 2005 with respect to which the present application is a Continuation-In-Part.
  • [0057]
    It would be further appreciated that according to some embodiments of the invention, the device for scanning a plurality of computerized devices connected to a network and any of its components may be implemented in hardware, software and any combination thereof.
  • [0058]
    Reference is now additionally made to FIG. 2, which is a block diagram illustration of a typical network of an organization including a device 100 for scanning a plurality of computerized devices connected to a network. In FIG. 2, and according to some embodiments of the invention, the network 10 is shown to be comprised of a plurality of local area networks (LANs) 20 connected together using different types of connections (for example—dedicated lines, the Internet) forming a wide area network (WAN) 30, which may serve, for example, two (or more) different locations or branches of the organization. It should be noted that the present invention is not limited to any particular network architecture or topology and that rather, in accordance with some embodiments of the present invention, any group of computerized devices forming a network may be scanned using the device 100.
  • [0059]
    As part of some embodiments of the present invention, the device 100 may be connected to the network 10. For example, as is shown in FIG. 2, and according to some embodiments of the invention, the device 100 may be part of one of the LANs 20, and may be operatively connected to the WAN 30 and to the computerized devices connected to WAN 30, including computerized devices which are at least partially under the control of the organization's network 10 administrator(s).
  • [0060]
    In accordance with some embodiments of the present invention, the device 100 may be operatively coupled to or may include a communication module 110. The communication module 10 may be, for example, a Network Interface Card (NIC) of an operator's computer 102 to which the device 100 may be operatively coupled. However, according to further embodiments of the invention, the device may include an integrated communication module. According to some embodiments of the invention, the communication module 110 may be configured to enable the device 100 to communicate with at least some, and typically all, of the computerized devices connected to the network 10.
  • [0061]
    It will also be understood that a system according to the invention may be a suitably programmed computer. Likewise, the invention contemplates a computer program being readable by a computer for executing the method of the invention. The invention further contemplates a machine-readable memory tangibly embodying a program of instructions executable by the machine for executing the method of the invention. The computer program product may include a computer useable medium having computer readable program code embodied therein for scanning a plurality of computerized devices connected to a network, the computer program product comprising: a computer readable program code for causing the computer to provide a plurality of computerize devices to be scanned; a computer readable program code for causing the computer to provide a plurality of threads of an agentless module and associating each thread of the agentless module with at least one of the plurality of computerized devices; and a computer readable program code for causing the computer to utilize the plurality of threads of the agentless module to configure a plurality of remote access processes to scan in parallel and without using agents at least two of the plurality of remote computerized devices.
  • [0062]
    Provided below, is a description of specific embodiments of the invention which relates to enforcing a security policy on a plurality of computerized devices. The embodiments described below provide an example of possible implementation of some embodiments of the invention. Turning now to FIG. 3, there is shown a block diagram illustration of a device for enforcing a security policy on a plurality of computerized devices connected to a network, according to some embodiments of the invention. In accordance with some embodiments of the present invention, a device 300 for enforcing a security policy on a plurality of computerized devices connected to a network may include an enforcement module 320 and an agentless module 130. In accordance with some embodiments of the present invention, the enforcement module 320 may be operatively connected to the agentless module 130.
  • [0063]
    The enforcement module 320 may be adapted to provide a plurality of computerized devices on which a security policy is to be enforced. According to some embodiments of the invention, the security policy may be predefined or may be specifically defined for one or more enforcement cycles. According to some embodiments of the invention, the enforcement module 320 may be adapted to invoke or otherwise activate and utilize a plurality of threads of the agentless module 130, for example threads 130A-130C, in a manner to cause a plurality of remote access processes 160 to update in parallel and without using agents two or more of the plurality of computerized devices in accordance with the security policy.
  • [0064]
    According to some embodiments of the invention, a security policy may include data in respect of one or more data items and a security setting(s) associated with the data items. In accordance with further embodiments of the invention, the security policy may include any data which may be necessary in order to enable a remote access process to update the data on a computerized device connected to the network in accordance with the security setting. For example, according to some embodiments of the invention, the security policy may include a data item and data in respect of a certain action which is to be preformed in case a computerized device is not in compliance with the security policy associated with the specific item. According to further embodiments of the invention, a security policy may include data in respect of one or more of the following: an application, a file, a process, a service, a registry key, registry value or a registry value. A list of data items to be enforced on one more computerized devices may include one more “black lists” and/or one or more “white lists”.
  • [0065]
    As mentioned above, the enforcement module may be adapted to utilize a plurality of threads of the agentless module 130. Each of the plurality of threads of the agentless module 130 may be adapted to utilize a remote access process 160 to enable to update the data on the plurality of computerized devices in accordance with the security policy as necessary. According to some embodiments of the invention, as part of utilizing a remote access process, a thread of the agentless module 130 may be adapted to configure the remote access process being utilized to cause without using agents one or more remote computerized devices associated with the thread to perform a designated action in respect of a designated data item with which the designated action is associated. Further according to some embodiments of the present invention, as part of implementing the security policy, a plurality of threads of the agentless module 130 may be utilized to configure a plurality of remote access processes to update without using agents a plurality of computerized devices in accordance with the security policy, as necessary. According to some embodiments of the invention, the plurality of threads of the agentless module 130 may be utilized such that two or more of the computerized devices are updated in accordance with the security policy in parallel, without using agents. According to further embodiments of the invention, the plurality of threads of the agentless module 130 may be utilized in a manner to cause, without using agents, two or more remote computerized devices to perform in parallel a designated action in respect of data items located thereon. According to yet further embodiments of the invention, the plurality of threads of the agentless module 130 may be utilized in a manner to cause without using agents two or more remote computerized devices to perform in parallel an action in respect of different data items located thereon (and possibly also different actions).
  • [0066]
    According to some embodiments of the invention, a remote access process may be any process which is adapted to cause a remote computerized device to perform a designated action with respect to a designated data item on the remote computerized device without using agents. According to further embodiments of the invention, a remote access process may be any process which is adapted to cause a remote computerized device to update a data item on the remote computerized device in accordance with a security policy, for example, a predefined security policy or a ad-hoc security policy, and without using agents. The device 100 may be associated with at least two, but possibly with more remote access processes 160 (or with a plurality of threads of a remote access process). As part of some embodiments of the invention, the remote access process 160 may be generated by the device 300 itself or may be provided by a computerized device 302 with which the device 300 or on which the device 300 is implemented. For example, the remote access processes 160 may be provided by an operating system running on an operator's computerized device 302.
  • [0067]
    It would be appreciated that as part of the present invention, in some cases, although an instruction from a remote access process is received at a remote computerized device to perform a certain action with respect to data corresponding to a certain data item, for example, an instruction to update the data item, the action may be inapplicable due to the actual status of the data corresponding to the data item on the remote computerized device being compliant with the security policy. For example, if a remote computerized device is instructed by a remote access process utilized by the device 300 to delete certain data from the registry on the computerized device and the registry on the remote computerized device does not contain such data in the first place, the action may be inapplicable. It would be further appreciated that if an instruction is received at a remote computerized device to perform a certain action with respect to data corresponding to a certain data item and the action is not applicable, for example, due to the actual status of the data corresponding to the data item, the remote computerized device may generate an exception message. According to some embodiments of the invention, if an exception message is generated on a remote computerized device in response to instruction received from a remote access process utilized by the device 300, the message may be resolved locally (for example, it is ignored). The handling of the message by the computerized devices may include ignoring the message, collecting and storing data with respect to the messages, analyzing the messages and data with respect to the messages, etc.
  • [0068]
    Thus, according to some embodiments of the invention, each thread of the agentless module 130 may be adapted to utilize one or more remote access process operable to cause one or more remote computerized devices to perform a designated action in respect of data item with which the designated action is associated, contingent upon there being certain data corresponding to the designated data item (such as, a registry key) on the computerized device or contingent upon the lack of such data on the computerized device. Further according to some embodiments of the present invention, at least two threads of the agentless module 130 may be used to configure two or more remote access processes 160 to cause two or more remote computerized devices to perform a designated action in respect of a designated data item with which the designated action is associated, contingent upon there being certain data corresponding to the designated data item on the computerized device or contingent upon the lack of data corresponding to the designated data item on the computerized device. According to still further embodiments of the present invention, at least two threads of the agentless module 130 may be used to configure two or more remote access processes 160 in a manner to cause two or more remote computerized devices to perform a designated action in respect of a designated data item with which the designated action is associated in parallel and without using agents, contingent upon there being certain data corresponding to the designated data item on the computerized device or contingent upon the lack of data corresponding to the designated data item on the computerized device.
  • [0069]
    The enforcement module 320 may be adapted to associate each thread of the agentless module 130 with one or more of the computerized devices on which the security policy is to be enforced, so that each thread of the agentless module 130 is associated with at least one of the plurality of computerized devices on which the security policy is to be enforced. It would be appreciated that dividing the plurality of computerized devices on which the security policy is to be enforced amongst the plurality of threads of the agentless module 130 may enable the enforcement of the security policy on a plurality of computerized devices in parallel and without using agents.
  • [0070]
    It should be noted that according to some embodiments of the invention, the computerized devices on which the security policy is to be enforced may include all the computerized devices connected to an organization's network or only some of the computerized devices connected to the organization's network which have been selected to undergo the policy enforcement described herein. In accordance with further embodiments of the invention, the list of computerized devices on which a security policy is to be enforced may be predetermined and predefined and may include up to all the computerized devices within the organization's network 10. However, according to other embodiments of the invention, not necessarily all the computerized devices connected to an organization's network are to undergo the policy enforcement. According to further embodiments of the invention, the list of computerized devices which are to undergo policy enforcement may be modified from time to time.
  • [0071]
    According to some embodiments of the invention, as part of selecting the computerized devices on which a security policy is to be enforced, data with respect to the computerized devices connected to the organization's network may be obtained from an organizational prime domain controller (PDC) or from an organizational active directory (AD), for example. The data is obtained to determine which computerized devices can be acted upon, and not for triggering the security policy enforcement. Further as part of providing the computerized devices on which a security policy is to be enforced, an operator of the device 300 may utilize the user interface 150 to select from amongst the computerized devices connected to the organization's network which computerized devices are to undergo the policy enforcement. In accordance with further embodiments of the invention, the data with respect to the computerized devices on which a security policy is to be enforced may be obtained from a file containing suitable data. It should be appreciated that several security policies may be created, and each security policy may be enforced on a different group of computerized devices.
  • [0072]
    In accordance with some embodiments of the present invention, the enforcement module 320 may be adapted to determine what number of threads of the agentless module 130 to create and/or utilize. The selection of the number of threads to be created and/or utilized was discussed above. According to one embodiment of the present invention, the enforcement module 320 may be preconfigured to utilize one of several pre-selected numbers of threads of the agentless module 130 pending an appropriate selection, and an operator of the device 300 may select the desired number of threads of the agentless module 130 to be used as part of the enforcement process. For example, different numbers of threads may be associated with different enforcement speeds and the operator may determine the number of threads to be used (or to be invoked) by selecting the desired operation speed (for example—very slow, slow, medium, high and very high). According to further embodiments of the present invention, a fixed number of threads of the agentless module 130 may be created. It would be appreciated that some embodiments of the invention are not limited in this respect.
  • [0073]
    The enforcement module 320 may be adapted to determine which of the plurality of computerized devices is to be assigned to which thread of the agentless module 130 as was discussed above. For example, in accordance with one embodiment of the invention, the enforcement module 320 may be configured to substantially evenly divide the specified computerized devices between all the threads of the agentless module 130 which are to be utilized. In accordance with further embodiments of the present invention, the computerized devices may be divided amongst the threads of the agentless module 130 in accordance with predefined rules and/or based upon predefined criteria or parameters. However, the present invention is not limited in this respect, and the enforcement module 320 may be configured to otherwise determine which of the computerized devices is to be assigned to which thread of the agentless module 130.
  • [0074]
    In addition, with respect to each computerized device, the enforcement module 320 may be adapted to associate the thread of the agentless module 130 with which a computerized device is associated with a data item which is part of the security policy associated with the computerized device. According to further embodiments of the invention, the enforcement module 320 may be adapted to associate the thread of the agentless module 130 with which a computerized device is associated with a predefined action to be performed on the computerized device with respect to a data item which is part of the security policy associated with the computerized device. According to some embodiments of the invention, in case more than one data item is designated for a computerized device, and the enforcement module 320 associates the computerized device with a single thread of the agentless module 130, the enforcement module 320 will associate the thread with all the data items and corresponding actions which were designated for that computerized device, however in case the enforcement module 320 associates the computerized device with two or more threads, the designated data items may be divided amongst the threads with which the computerized device is associated.
  • [0075]
    Each thread of the agentless module 130 may be adapted to utilize a remote access process 160, as was discussed above. According to some embodiments of the invention, two or more of the remote access processes 160 utilized by the threads of the agentless module may be operable to cause without using agents a plurality (two or more) of remote computerized devices to perform an action in parallel with respect to at least a data item. According to some embodiments of the invention, the agentless module 130 may include the necessary logic needed to enable two or more threads of the agentless module 130 to configure and utilize at least two remote access processes 160 to cause without using agents two or more computerized devices to perform in parallel a designated action with respect to at least a designated data item.
  • [0076]
    It would be appreciated by those of ordinary skill in the art, that according to some embodiments of the invention, using a plurality of threads of the agentless module 130 to utilize in parallel a plurality of remote access processes, may enable to perform without using agents a designated action in parallel on a plurality of remote computerized device with respect to data corresponding to a designated data item or items. According to other embodiments of the invention, the plurality of threads of the agentless module 130 may be utilized in a manner to cause remote access processes 160 to be utilized in a manner to cause two or more computerized devices to perform without using agents a designated action with respect to a data item or data items in parallel.
  • [0077]
    According to some embodiments of the invention, a plurality of threads of the agentless module 130 may be adapted to configure and utilize a plurality of remote access processes 160 to cause a plurality of remote computerized device(s) associated with the threads to perform a designated action with respect to a data item with which the action is associated, contingent upon there being data corresponding to the designated data item on the computerized device or contingent upon the lack of data corresponding to the designated data item on the computerized device.
  • [0078]
    As part of some embodiments of the present invention, each remote access process 160 may be utilized in a manner to generate at least a command for each computerized device associated with the thread of the agentless module 130 used to utilize the remote access process. Each command may be effective for causing the remote computerized device to perform without using an agent a designated action with respect to a data item on the computerized device, contingent upon there being data corresponding to the data item on the computerized device or contingent upon the lack of such data on the computerized device. According to some embodiments of the invention, at least two remote access processes 160 may be utilized in a manner to generate at least two commands intended to cause each of at least two computerized devices to perform substantially in parallel and without using agents a designated action with respect to a data item, contingent upon there being data corresponding to the data item on the computerized device or contingent upon the lack of certain data in respect of the data item on the computerized device.
  • [0079]
    One example of a remote access process which may be used by the device 100 (and specifically by a plurality of threads of the agentless module 130) to cause a plurality of computerized devices to perform a certain action with respect to at least a designated data item with which the action is associated, includes various kinds of application programming interfaces (APIs). It will be appreciated by those of ordinary skill in the art, that various remote access processes, including various APIs, may be an integrated component of some operating systems sold on the market, however, other APIs may also be used. In accordance with further embodiments of the present invention, the threads of the agentless module 130 may be configured to utilize various other APIs in a manner to cause without using an agent a remote computerized device to perform a designated action with respect to designated data items with which the designated actions are associated, including but not limited to, APIs capable of causing a remote computerized device to add and/or remove an application, APIs capable of causing a remote computerized device to invoke/terminate a process on the computerized device(s), APIs capable of causing a remote computerized device to start/stop a service, APIs capable of updating, writing into or deleting from a registry of the computerized device.
  • [0080]
    In order to enable a remote access process to cause a remote computerized device to perform a designated action in respect of a designated data item (such as a registry key), for example, to enable it to update a certain data item, each thread of the agentless module 130 may be adapted to provide a remote access process with the necessary data with respect to a computerized device, a designated data item and an associated action to be preformed with respect to the data item on the computerized device. In case a plurality of computerized devices are associated with a certain thread of the agentless module 130, the thread may provide the network address of each of the computerized devices associated with the thread to the relevant remote access process(es) for enabling it to update the relevant data items on the computerized devices. However, further embodiments of the invention are not limited in this respect, and the computerized device on which the security policy is to be enforced may be otherwise identified, including but not limited to, by their host names.
  • [0081]
    According to some embodiments of the invention, the data items associated with the security policy may be selected automatically, for example, based upon statistical data collected during previous scans of computerized devices connected to the network, or in addition or as an alternative, one or more data items may be designated manually, for example, by an operator of the device 300. The device may include a user interface 150 through which the operator can provide the necessary data in respect to the data items. The operator may utilize the user interface 150 to provide data regarding an action to be performed as part of the security policy with respect to a designated data item, or the action to be performed in respect to a data item may be provided automatically. The device 300 may also include a database 340 or any other data structure which includes data with respect to data items, and the data items to be included in the security policy may be selected automatically and/or manually from the database 340. The database 340 may further include data with regard to actions which may be performed with respect to the data items and the actions to be performed on the data items included in the security policy may be selected from the database 340 automatically and/or manually.
  • [0082]
    Reference is now made to FIG. 4, which is a an illustration of an exemplary database including data with respect to data items, and data with respect to action which may be used to configure a threads of the agentless module, according to some embodiments of the invention. In accordance with some embodiments of the invention, the data stored in the database 340 may be, but is not necessarily, associated with security threats. According to further embodiment of the invention, the data in the database 340 may be associated with various applications, services, processes, registry keys/values and/or hardware devices which may pose a potential security threat when enabled, active and/or installed on a computerized device connected to the organization's network, and should therefore be disabled, de-activated and/or uninstalled; and/or the data in the database 140 may be associated with various applications, services, processes, registry keys/values and/or hardware devices which may protect the organization network from security threats and which therefore need to be installed, activated and enabled on a computerized device in order to prevent potential security threats.
  • [0083]
    Reference is now made to FIG. 4, which is an lustration of a portion of a table which may be used in accordance with some embodiments of the invention for enabling enforcing a security policy on a plurality of computerized devices connected to a network. In FIG. 4, the database 340 includes data with respect to a registry key 402, a process 404 and a file (not shown) which are associated with the same application, in this case, ICQTM, an instant messaging application. For each of the registry key 402, process 404 and file associated with the ICQTM application, the database 340 includes data with respect to an action which is to be performed in respect of the corresponding data item. In FIG. 4, according to the security policy, ICQTM is not allowed. Thus, with respect to the registry key 402 associated with ICQTM, the database 340 includes a “remove” action 403, which is intended to enable the configuration of a remote access process to cause a remote computerized device to remove without using agent the data of registry key 402 (or the entire registry key) with which the remove action 403 is associated, contingent upon there being data with respect to the registry key 402 in the registry of the remote computerized device. With respect to the process 404 associated with ICQTM, the database 440 includes a “terminate” action 405, which is intended to enable the configuration of a remote access process to cause a remote computerized device to terminate without using agents the process 404 with which the terminate action is associated, contingent upon the designated process being active on the remote computerized device.
  • [0084]
    The database 340 may also include data with respect to a certain file (not shown) associated with ICQTM, for example, and an action with respect to the file. For example, the file may be an uninstall file which is intended to remove the ICQTM application from a computerized device, and the action may be a “run” or “execute” action which is intended to enable the configuration of a remote access process to cause (without using agents) a remote computerized device to execute the uninstall file, contingent upon there being an appropriate uninstall file on the remote computerized device.
  • [0085]
    In exemplary the database 340 shown in FIG. 4 there is also included data with respect to a registry key 412 which is associated with a wireless communication modem and an action 413 associated with the registry key 412. The action 413 associated with the registry key 412 is intended to enable the configuration of a remote access process to cause (without using agents) a remote computerized device to modify data in the remote computerized device's registry which corresponds to the registry key 412, such that a wireless communication device associated with the computerized device is disabled. In the case of registry key 412, the hardware device associated with the registry key is disabled by modifying the data corresponding to the registry key rather than by deleting the registry key.
  • [0086]
    Also included in the database 340 shown in FIG. 4, and according to some embodiments of the invention, a data item 422 correlated with a process associated with an anti-virus application is provided, as well as an action 423 associated with the data item 422. The action 423 associated with data item 422 is intended to enable the configuration of a remote access process to cause (without using agents) a remote computerized device to activate the process associated with data item 422 on the remote computerized device.
  • [0087]
    According to some embodiments of the invention, the database 340 may include any additional data which may be necessary to enable a thread of the agentless module to utilize a remote access process to cause without using agents a remote computerized device to perform a designated action with respect to a designated data item with which the designated action is associated. For example, in accordance with some embodiments of the present invention, the database 340 may include for a certain data item data with respect to a location on a computerized device where data corresponding to the data item is expected to be found. Such data may be provided to the remote access process to provide the remote access process with data in respect of the location of the data item on a remote computerized device. The data with respect to a location on a computerized device where data corresponding to a data item is expected to be found may include a path(s) to a specific location(s)) on a computerized device which is associated with the data item.
  • [0088]
    In FIG. 4, each data item is associated with a certain subject. Each subject may provide a description with respect to an application, a service, a registry key/value and/or hardware device associated with the subject. Each subject may be associated with one or more data items. For example, in database 340, registry key 402. process 404, and file or application (not shown) are associated with the ICQTM subject 405; registry key 412 is associated with a 802.11x compatible hardware device subject 425; and process 422 is associated with the Antivirus subject 415.
  • [0089]
    Reference is now additionally made to FIG. 5, which is a flow chart illustration of a method of enforcing a security policy on a plurality of computerized devices connected to a network, according to some embodiments of the present invention. Initially, a plurality of computerized devices may be provided for undergoing policy enforcement (block 510). For each of the computerized devices which are to undergo policy enforcement a data item and an associated action may be designated (block 520). As mentioned above, according to further embodiments of the invention, for a computerized device which is to undergo policy enforcement (or for a group of such computerized devices) several data items may be designated.
  • [0090]
    Next, a plurality of threads of an agentless module may be utilized (block 530). According to some embodiments of the invention, the number of threads of the agentless module provided for enforcing the security policy may be predefined. According to further embodiments of the invention, the number of threads which may be provided may be dynamic and may depend upon, for example, the number of computerized devices selected for undergoing policy enforcement, the number of data items which have been designated, current network performance parameters, as well as on other parameters, rules, characteristics. The plurality of threads of the agentless module may be generated on demand based upon what was determined with respect to the number of threads to be used. The enforcement module may be configured to determine what number of threads is to be provided in accordance with predefined criteria and based upon one or more parameters, rules or characteristics.
  • [0091]
    Each of the threads of the agentless module may be associated with at least one of the plurality of computerized devices, and in respect of each computerized device, with at least a data item and an associated action designated thereto (block 540). According to some embodiments of the invention, the computerized devices may be associated with the plurality of threads of the agentless module in accordance with a predefined criterion/a as was discussed above.
  • [0092]
    After the computerized devices and their designated data items and associated action are associated with the plurality of threads of the agentless module, each thread may be configured to utilize a remote access process(es). The threads may be configured to utilize the remote access processes to cause the computerized device(s) associated with the remote access process to perform at least a designated action with respect to at least a designated data item with which the designated action is associated, contingent upon there being data corresponding to the designated data item on the computerized devices or contingent upon the lack of data corresponding to the designated data item on the computerized device (block 550).
  • [0093]
    It would be appreciated that some embodiments of the invention allow an organization to enforce a certain security policy on a plurality of computerized devices in parallel and without being dependant on agents, substantially as described above. It would therefore be apparent to those of ordinary skill in the art that some embodiments of the invention may provide substantial advantages. For example, an administrator utilizing a device in accordance with some embodiments of the invention may be capable of enforcing a certain security policy on a plurality of computerized devices in parallel and without being dependent on agents, so that the turnaround time needed to complete a full enforcement cycle with respect to the potential threats which are being addressed by the device is kept relatively short, while credibility is at a relatively high level (no agents are used). According to some embodiments of the invention, security policy enforcement cycle may be routinely performed (around the clock, for example), or it may be in response to predefined events or criteria or manually initiated, in which case the security enforcement scan may also be repeated several times or it may be performed in several scanning/enforcement cycles. However, it should be noted that some embodiments of the invention are not limited by any particular performance attributes or parameters nor is it limited to any particular credibility quality or level.
  • [0094]
    While certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents will occur to those skilled in the art. It is therefore to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true scope of the invention.

Claims (36)

  1. 1. A method of scanning a plurality of computerized devices connected to a network, comprising:
    providing a plurality of computerize devices to be scanned; and
    providing a plurality of threads of an agentless module and associating each thread of the agentless module with at least one of the plurality of computerized devices; and
    utilizing the plurality of threads of the agentless module to configure a plurality of remote access processes to scan in parallel and without using agents at least two of the plurality of remote computerized devices.
  2. 2. The method according to claim 1, wherein said utilizing comprises utilizing each thread to configure one or more remote access processes to scan a computerized device associated with the thread.
  3. 3. The method according to claim 2, wherein said providing a plurality of threads of an agentless module comprises associating at least one of the threads with two or more computerized devices.
  4. 4. The method according to claim 1, wherein said providing a plurality of threads of an agentless module comprises determining the number of threads to be provided in accordance with a predefined criterion.
  5. 5. The method according to claim 4, wherein said determining comprises determining the number of threads to be provided in accordance with one or more of the following: a number of computerized devices to be scanned, a network performance parameter, a target scanning speed, a connection speed with respect to the computerized devices to be scanned, various characteristics of the computerized devices, geographical location of the computerized devices to be scanned, statistical data collected in respect of previous scans, a result or results of a previous scan.
  6. 6. The method according to claim 5, wherein said associating each thread of the agentless module with at least one of the plurality of computerized devices is performed in accordance with one or more of the following: parameters associated with a connection to the computerized device, various characteristics of the computerized device, geographical location of the computerized device, organizational location of the computerized devices, statistical data collected in respect of previous scans, a result or results of a previous scan.
  7. 7. The method according to claim 1, further comprising:
    providing for each of the plurality of computerized devices to be scanned data with respect to one or more data items to be scanned thereon, and
    wherein said utilizing comprises utilizing the plurality of threads of the agentless module to configure a plurality of remote access processes to scan in parallel and without using agents at least two of the plurality of remote computerized devices in accordance with one or more data items associated with the computerized devices.
  8. 8. The method according to claim 7, wherein said associating further comprises associating each thread of the agentless module with a data item to be scanned on a computerized device associated with the thread.
  9. 9. The method according to claim 8, wherein said providing a plurality of threads of an agentless module comprises determining the number of threads to be provided in accordance with at least one or more of the following: a severity of a data item or data items to be scanned, a number of data items to be scanned, a target scanning speed, a connection speed with respect to the computerized devices to be scanned.
  10. 10. The method according to claim 7, wherein said associating each thread of the agentless module with a data item to be scanned on a computerized device associated therewith, comprises associating a first thread of the agentless module with a first data item to be scanned on a first computerized device and associating a second thread of the agentless module with a second data item to be scanned on the first computerized device.
  11. 11. The method according to claim 9, wherein said plurality of threads of the agentless module are utilized in a manner to cause two or more remote access processes to be utilized in parallel for scanning a remote computerized device with respect to two or more different data items.
  12. 12. The method according to claim 7, wherein the data with respect to a data item to be scanned includes one or more of the following: a path to a location on a computerized device, data with respect to a severity of a security threat associated with the data item, data with respect to a remote access process to be used for scanning a remote computerized device for data in respect of the data item, a security setting associated with the data item, a data with respect to a type of the data item.
  13. 13. The method according to claim 7, wherein scanning a computerized device comprises one or more of the following:
    scanning the remote computerized device for data in respect of a data item associated therewith;
    comparing data on a computerized device in respect of a data item in accordance with a security setting associated with the data item; and
    updating data on a computerized device in respect of a data item in accordance with a security setting associated with the data item.
  14. 14. The method according to claim 1, wherein a data item is one from a group including: a configuration, an application, a file, a process, a service, a registry key, a registry value.
  15. 15. The method according to claim 1, wherein the initiation of a scanning of the plurality of computerized devices is insensitive to a new attachment of any of the plurality of computerized devices to the network.
  16. 16. The method according to claim 1, wherein the initiation of a scanning of the plurality of computerized devices is performed automatically in response to one or more of the following: a completion of a previous scan, an event occurring on a computerized device connected to the network, a predefined schedule.
  17. 17. The method according to claim 1, wherein the scanning of the plurality of computerized devices is characterized by a relatively short turnaround time.
  18. 18. A device for scanning a plurality of computerized devices connected to a network, comprising:
    a scanning module adapted to provide a plurality of computerize devices to be scanned;
    an agentless module adapted to provide a plurality of threads,
    wherein the scanning module is adapted to associate each of the plurality of threads of the agentless module with at least one of the plurality of computerized devices; and
    wherein the scanning module is adapted to utilize the plurality of threads of the agentless module to configure a plurality of remote access processes to scan in parallel and without using agents at least two of the plurality of remote computerized devices.
  19. 19. The device according to claim 18, wherein the scanning module is adapted to utilize each thread of the agentless module to configure one or more remote access processes to scan a computerized device associated with the thread.
  20. 20. The device according to claim 19, wherein the agentless module is adapted to associated at least one of the threads with two or more computerized devices.
  21. 21. The device according to claim 18, wherein the agentless module is adapted to determine the number of threads to be provided.
  22. 22. The device according to claim 18, wherein the number of threads of the agentless module to be provided is manually selected by an operator.
  23. 23. The device according to claim 21, wherein the number of threads to be provided is determined in accordance with a predefined criterion.
  24. 24. The device according to claim 18, wherein said scanning module is adapted to provide to each of the plurality of computerized devices to be scanned data with respect to one or more data items to be scanned thereon, and wherein said agentless module is adapted to utilize the plurality of threads of the agentless module to configure a plurality of remote access processes to scan in parallel at least two of the plurality of remote computerized devices in accordance with one or more data items associated with the computerized devices.
  25. 25. The device according to claim 24, wherein said scanning module is adapted to associate each thread of the agentless module with a data item to be scanned on a computerized device associated with that thread.
  26. 26. The device according to claim 24, the scanning module is adapted to utilize the plurality of threads of the agentless module to configure a plurality of remote access processes to perform one or more of the following:
    scan the remote computerized device for data in respect of a data item associated therewith;
    compare data on a computerized device in respect of a data item in accordance with a security setting associated with the data item; and
    update data on a computerized device in respect of a data item in accordance with a security setting associated with the data item.
  27. 27. The device according to claim 18, wherein a data item is selected from a group including: a configuration, a file, a process, a service, a registry key, a registry value, a registry value.
  28. 28. The device according to claim 18, wherein the scanning module is adapted to initiate a scanning of the plurality of computerized devices, and wherein the initiation of the scanning of the plurality of computerized devices is insensitive to a new attachment of any of the plurality of computerized devices to the network.
  29. 29. The device according to claim 18, wherein the scanning module is adapted to automatically initiate a scanning of the plurality of computerized devices in response to one or more of the following: a completion of a previous scan, an event occurring on a computerized device connected to the network, a predefined schedule.
  30. 30. A computer program product comprising a computer useable medium having computer readable program code embodied therein for scanning a plurality of computerized devices connected to a network, the computer program product comprising:
    computer readable program code for causing the computer to provide a plurality of computerize devices to be scanned;
    computer readable program code for causing the computer to provide a plurality of threads of an agentless module and associating each thread of the agentless module with at least one of the plurality of computerized devices; and
    computer readable program code for causing the computer to utilize the plurality of threads of the agentless module to configure a plurality of remote access processes to scan in parallel and without using agents at least two of the plurality of remote computerized devices.
  31. 31. A method of enforcing a security policy on a plurality of computerized devices within an organization's network, said method comprising:
    designating a data item and an associated action for each of the plurality of computerized devices; and
    providing a plurality of threads of an agentless module, each thread being associated with at least one of the plurality of computerized devices, and in respect of each computerized device, with at least a data item an associated action designated thereto;
    each thread of the agentless module may be utilizing to configure a remote access process in a manner to cause each of the remote computerized device(s) associated with the thread to perform the designated action in respect of data corresponding to the designated data item on the remote computerized device(s), contingent upon there being data corresponding to the designated data item on the computerized device or the lack thereof.
  32. 32. The method according to claim 31, wherein the plurality of threads of the agentless module is utilized in a manner to cause a plurality of remote access processes to update in parallel and without using agents data items on two or more of the plurality of computerized devices in accordance with the security policy.
  33. 33. The method according to claim 31, wherein each thread of the agentless module is utilized to configure a remote access process in a manner to generate at least a command for each computerized device associated with the thread of the agentless module.
  34. 34. The method according to claim 33, wherein each thread of the agentless module is utilized to configure a remote access process in a manner to generate at least a command which is effective for causing the remote computerized device to perform without using an agent a designated action with respect to a data item on the computerized device, contingent upon there being data corresponding to the data item on the computerized device or contingent upon the lack thereof.
  35. 35. A device for enforcing a security policy on a plurality of computerized devices within an organization's network, said device comprising:
    an enforcement module adapted to receive data designating a data item and an associated action for each of the plurality of computerized devices; and
    an agentless module adapted to provide a plurality of threads, each thread being associated with at least one of the plurality of computerized devices, and in respect of each computerized device, with at least a data item and an associated action designated thereto;
    each thread of the agentless module is adapted configure a remote access process in a manner to cause each of the remote computerized device(s) associated with the thread to perform the designated action in respect of data corresponding to the designated data item on the remote computerized device(s), contingent upon there being data corresponding to the designated data item on the computerized device or the lack thereof.
  36. 36. A system enabling a security policy enforcement within an organization's network, said system comprising:
    a plurality of computerized devices;
    an operator's computer, said operator's computer comprising:
    an enforcement module adapted to receive data designating a data item and an associated action for each of the plurality of computerized devices; and
    an agentless module adapted to provide a plurality of threads, each thread being associated with at least one of the plurality of computerized devices, and in respect of each computerized device, with at least a data item and an associated action designated thereto;
    each thread of the agentless module is adapted to configure a remote access process in a manner to cause each of the remote computerized device(s) associated with the thread to perform the designated action in respect of data corresponding to the designated data item on the remote computerized device(s), contingent upon there being data corresponding to the designated data item on the computerized device or the lack thereof.
US11396602 2004-10-04 2006-04-04 Method and device for scanning a plurality of computerized devices connected to a network Active 2027-08-18 US8566939B2 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
IL16440204 2004-10-04
IL164402 2004-10-04
US67204605 true 2005-04-18 2005-04-18
US67204505 true 2005-04-18 2005-04-18
US67207205 true 2005-04-18 2005-04-18
US67205005 true 2005-04-18 2005-04-18
US11226451 US7752671B2 (en) 2004-10-04 2005-09-15 Method and device for questioning a plurality of computerized devices
US11396602 US8566939B2 (en) 2004-10-04 2006-04-04 Method and device for scanning a plurality of computerized devices connected to a network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11396602 US8566939B2 (en) 2004-10-04 2006-04-04 Method and device for scanning a plurality of computerized devices connected to a network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11226451 Continuation-In-Part US7752671B2 (en) 2004-10-04 2005-09-15 Method and device for questioning a plurality of computerized devices

Publications (2)

Publication Number Publication Date
US20060184682A1 true true US20060184682A1 (en) 2006-08-17
US8566939B2 US8566939B2 (en) 2013-10-22

Family

ID=36126971

Family Applications (3)

Application Number Title Priority Date Filing Date
US11226451 Active 2028-12-18 US7752671B2 (en) 2004-10-04 2005-09-15 Method and device for questioning a plurality of computerized devices
US11396602 Active 2027-08-18 US8566939B2 (en) 2004-10-04 2006-04-04 Method and device for scanning a plurality of computerized devices connected to a network
US12785259 Active 2026-02-04 US8544099B2 (en) 2004-10-04 2010-05-21 Method and device for questioning a plurality of computerized devices

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11226451 Active 2028-12-18 US7752671B2 (en) 2004-10-04 2005-09-15 Method and device for questioning a plurality of computerized devices

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12785259 Active 2026-02-04 US8544099B2 (en) 2004-10-04 2010-05-21 Method and device for questioning a plurality of computerized devices

Country Status (5)

Country Link
US (3) US7752671B2 (en)
EP (1) EP1805641B1 (en)
JP (1) JP2008516308A (en)
CA (1) CA2582390A1 (en)
WO (1) WO2006038210B1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070143847A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing automatic signature generation and enforcement
US20070143848A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing computer and network security for polymorphic attacks
US20070143850A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US20070256127A1 (en) * 2005-12-16 2007-11-01 Kraemer Jeffrey A Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US20080072032A1 (en) * 2006-09-19 2008-03-20 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Configuring software agent security remotely
US20110047369A1 (en) * 2006-09-19 2011-02-24 Cohen Alexander J Configuring Software Agent Security Remotely
US20110185431A1 (en) * 2010-01-28 2011-07-28 Tenable Network Security, Inc. System and method for enabling remote registry service security audits
US20110185055A1 (en) * 2010-01-26 2011-07-28 Tenable Network Security, Inc. System and method for correlating network identities and addresses
US20110191836A1 (en) * 2010-02-02 2011-08-04 Indeni, Ltd. Apparatus For Real-Time Management Of The Performance Of Security Components Of A Network System
US20110231935A1 (en) * 2010-03-22 2011-09-22 Tenable Network Security, Inc. System and method for passively identifying encrypted and interactive network sessions
US8086582B1 (en) * 2007-12-18 2011-12-27 Mcafee, Inc. System, method and computer program product for scanning and indexing data for different purposes
US20120110059A1 (en) * 2010-10-29 2012-05-03 Microsoft Corporation Unified policy over heterogenous device types
US8549650B2 (en) 2010-05-06 2013-10-01 Tenable Network Security, Inc. System and method for three-dimensional visualization of vulnerability and asset data
US9043920B2 (en) 2012-06-27 2015-05-26 Tenable Network Security, Inc. System and method for identifying exploitable weak points in a network
US20150172140A1 (en) * 2013-12-18 2015-06-18 Thomson Reuters Global Resources (Trgr) System and method for dynamically scheduling network scanning tasks
US9088606B2 (en) 2012-07-05 2015-07-21 Tenable Network Security, Inc. System and method for strategic anti-malware monitoring
US9367707B2 (en) 2012-02-23 2016-06-14 Tenable Network Security, Inc. System and method for using file hashes to track data leakage and document propagation in a network
US9467464B2 (en) 2013-03-15 2016-10-11 Tenable Network Security, Inc. System and method for correlating log data to discover network vulnerabilities and assets
US9804747B2 (en) 2008-09-30 2017-10-31 Microsoft Technology Licensing, Llc Techniques to manage access to organizational information of an entity

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2013721A1 (en) * 2006-04-20 2009-01-14 International Business Machines Corporation A method for generating a robust software signature
CA2663299A1 (en) * 2006-09-12 2008-09-04 Telcordia Technologies, Inc. Ip network vulnerability and policy compliance assessment by ip device analysis
US8365289B2 (en) * 2007-04-12 2013-01-29 Core Sdi, Incorporated System and method for providing network penetration testing
WO2011119137A1 (en) 2010-03-22 2011-09-29 Lrdc Systems, Llc A method of identifying and protecting the integrity of a set of source data
US9792104B2 (en) 2010-11-05 2017-10-17 FedEx Supply Chain Logistics & Electronics, Inc. System and method for flashing a wireless device
US9251494B2 (en) * 2010-11-05 2016-02-02 Atc Logistics & Electronics, Inc. System and method for tracking customer personal information in a warehouse management system
US9465702B2 (en) * 2010-11-05 2016-10-11 Atc Logistics & Electronics, Inc. System and method for auditing removal of customer personal information on electronic devices
US9495367B2 (en) * 2010-11-05 2016-11-15 Atc Logistics & Electronics, Inc. System and method for performing a software comparison
US20120117227A1 (en) * 2010-11-10 2012-05-10 Sony Corporation Method and apparatus for obtaining feedback from a device

Citations (70)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5050213A (en) * 1986-10-14 1991-09-17 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US5163147A (en) * 1989-08-31 1992-11-10 Kabushiki Kaisha Toshiba Computer system with file security function
US5251294A (en) * 1990-02-07 1993-10-05 Abelow Daniel H Accessing, assembling, and using bodies of information
US5361359A (en) * 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer
US5604800A (en) * 1995-02-13 1997-02-18 Eta Technologies Corporation Personal access management system
US5610981A (en) * 1992-06-04 1997-03-11 Integrated Technologies Of America, Inc. Preboot protection for a data security system with anti-intrusion capability
US5694472A (en) * 1995-02-13 1997-12-02 Eta Technologies Corporation Personal access management system
US5696822A (en) * 1995-09-28 1997-12-09 Symantec Corporation Polymorphic virus detection module
US5778068A (en) * 1995-02-13 1998-07-07 Eta Technologies Corporation Personal access management system
US5812688A (en) * 1992-04-27 1998-09-22 Gibson; David A. Method and apparatus for using visual images to mix sound
US5828840A (en) * 1996-08-06 1998-10-27 Verifone, Inc. Server for starting client application on client if client is network terminal and initiating client application on server if client is non network terminal
US5859966A (en) * 1995-10-10 1999-01-12 Data General Corporation Security system for computer systems
US5878210A (en) * 1995-08-10 1999-03-02 Samsung Electronics Co., Ltd. Personal computer having a security function, a method of implementing the security function, and methods of installing and detaching a security device to/from a computer
US5910987A (en) * 1995-02-13 1999-06-08 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5920861A (en) * 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures
US5943422A (en) * 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US5943424A (en) * 1996-06-17 1999-08-24 Hewlett-Packard Company System, method and article of manufacture for processing a plurality of transactions from a single initiation point on a multichannel, extensible, flexible architecture
US5941947A (en) * 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
US5964889A (en) * 1997-04-16 1999-10-12 Symantec Corporation Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator
US5991735A (en) * 1996-04-26 1999-11-23 Be Free, Inc. Computer program apparatus for determining behavioral profile of a computer user
US6006328A (en) * 1995-07-14 1999-12-21 Christopher N. Drake Computer software authentication, protection, and security system
US6026379A (en) * 1996-06-17 2000-02-15 Verifone, Inc. System, method and article of manufacture for managing transactions in a high availability system
US6088799A (en) * 1997-12-11 2000-07-11 International Business Machines Corporation Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
US6151606A (en) * 1998-01-16 2000-11-21 Visto Corporation System and method for using a workspace data manager to access, manipulate and synchronize network data
US6158010A (en) * 1998-10-28 2000-12-05 Crosslogix, Inc. System and method for maintaining security in a distributed computer network
US6253027B1 (en) * 1996-06-17 2001-06-26 Hewlett-Packard Company System, method and article of manufacture for exchanging software and configuration data over a multichannel, extensible, flexible architecture
US6266773B1 (en) * 1998-12-31 2001-07-24 Intel. Corp. Computer security system
US6282546B1 (en) * 1998-06-30 2001-08-28 Cisco Technology, Inc. System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
US6292569B1 (en) * 1996-08-12 2001-09-18 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US6295639B1 (en) * 1998-09-01 2001-09-25 Aidministrator Nederland B.V. Securely accessing a file system of a remote server computer
US6298445B1 (en) * 1998-04-30 2001-10-02 Netect, Ltd. Computer security
US6304915B1 (en) * 1996-09-26 2001-10-16 Hewlett-Packard Company System, method and article of manufacture for a gateway system architecture with system administration information accessible from a browser
US6334189B1 (en) * 1997-12-05 2001-12-25 Jamama, Llc Use of pseudocode to protect software from unauthorized use
US6336135B1 (en) * 1996-05-24 2002-01-01 International Business Machines Corporation Gateway for converting synchronous client/server protocols into asynchronous messaging protocols and storing session state information at the client
US20020026605A1 (en) * 2000-04-06 2002-02-28 Terry Robert F. System and method for real time monitoring and control of a computer machine environment and configuration profile
US6366967B1 (en) * 1995-06-22 2002-04-02 Datascape, Inc. Open network system for i/o operation including a common gateway interface and an extended open network protocol with non-standard i/o devices utilizing device and identifier for operation to be performed with device
US6381589B1 (en) * 1999-02-16 2002-04-30 Neopost Inc. Method and apparatus for performing secure processing of postal data
US6400996B1 (en) * 1999-02-01 2002-06-04 Steven M. Hoffberg Adaptive pattern recognition based control system and method
US6418424B1 (en) * 1991-12-23 2002-07-09 Steven M. Hoffberg Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
US20020143921A1 (en) * 2001-04-03 2002-10-03 Yann Stephan Bus function authentication method, apparatus and computer program
US20030014636A1 (en) * 2000-02-01 2003-01-16 Ahlbrand Stephen D Physical identification and computer security apparatus and method
US20030041243A1 (en) * 2000-03-02 2003-02-27 Olguin Nelson Eric Ramirez Security system against illegal use and copy of eletronic data
US6553412B1 (en) * 1999-09-10 2003-04-22 Avantgo, Inc. System, method, and computer program product for web content aggregation and development, and web content delivery to clients
US6574737B1 (en) * 1998-12-23 2003-06-03 Symantec Corporation System for penetrating computer or computer network
US6587836B1 (en) * 1997-09-26 2003-07-01 Worldcom, Inc. Authentication and entitlement for users of web based data management programs
US6618806B1 (en) * 1998-04-01 2003-09-09 Saflink Corporation System and method for authenticating users in a computer network
US6625150B1 (en) * 1998-12-17 2003-09-23 Watchguard Technologies, Inc. Policy engine architecture
US20030188194A1 (en) * 2002-03-29 2003-10-02 David Currie Method and apparatus for real-time security verification of on-line services
US20030200308A1 (en) * 2002-04-23 2003-10-23 Seer Insight Security K.K. Method and system for monitoring individual devices in networked environments
US6640229B1 (en) * 1998-09-18 2003-10-28 Tacit Knowledge Systems, Inc. Automatic management of terms in a user profile in a knowledge management system
US6647384B2 (en) * 1998-09-18 2003-11-11 Tacit Knowledge Systems, Inc. Method and apparatus for managing user profiles including identifying users based on matched query term
US20030212779A1 (en) * 2002-04-30 2003-11-13 Boyter Brian A. System and Method for Network Security Scanning
US6658464B2 (en) * 1994-05-31 2003-12-02 Richard R. Reisman User station software that controls transport, storage, and presentation of content from a remote source
US6671813B2 (en) * 1995-06-07 2003-12-30 Stamps.Com, Inc. Secure on-line PC postage metering system
US20040000326A1 (en) * 2000-03-29 2004-01-01 Ziemins Uldis A. Wafer edge cleaning utilizing polish pad material
US6687375B1 (en) * 1999-06-02 2004-02-03 International Business Machines Corporation Generating user-dependent keys and random numbers
US6714962B1 (en) * 1997-10-28 2004-03-30 Microsoft Corporation Multi-user server application architecture with single-user object tier
US6725382B1 (en) * 1999-12-06 2004-04-20 Avaya Technology Corp. Device security mechanism based on registered passwords
US20040088581A1 (en) * 2002-11-04 2004-05-06 Brawn John Melvin Signal level propagation mechanism for distribution of a payload to vulnerable systems
US6751626B2 (en) * 2001-05-03 2004-06-15 International Business Machines Corporation Method, system, and program for mining data in a personal information manager database
US20040123157A1 (en) * 2002-12-13 2004-06-24 Wholesecurity, Inc. Method, system, and computer program product for security within a global computer network
US20040128252A1 (en) * 2002-10-09 2004-07-01 Sony Corporation Information processing device, contents distribution server, license server, and method and computer program
US6779120B1 (en) * 2000-01-07 2004-08-17 Securify, Inc. Declarative language for specifying a security policy
US20050097199A1 (en) * 2003-10-10 2005-05-05 Keith Woodard Method and system for scanning network devices
US20050193427A1 (en) * 2004-02-26 2005-09-01 Pramod John Secure enterprise network
US7231637B1 (en) * 2001-07-26 2007-06-12 Mcafee, Inc. Security and software testing of pre-release anti-virus updates on client and transmitting the results to the server
US20070180490A1 (en) * 2004-05-20 2007-08-02 Renzi Silvio J System and method for policy management
US7346929B1 (en) * 1999-07-29 2008-03-18 International Business Machines Corporation Method and apparatus for auditing network security
US20080115204A1 (en) * 2001-09-07 2008-05-15 Jon Ramsey Intergrated computer security management system and method
US7581249B2 (en) * 2003-11-14 2009-08-25 Enterasys Networks, Inc. Distributed intrusion response system

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5404394A (en) * 1993-05-24 1995-04-04 Comsat Corporation Secure communication system
JPH08185315A (en) 1994-12-28 1996-07-16 Nec Corp Security strengthened type program developing device
US5812668A (en) * 1996-06-17 1998-09-22 Verifone, Inc. System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing a multichannel, extensible, flexible architecture
US5940590A (en) 1997-05-31 1999-08-17 International Business Machines Corporation System and method for securing computer-executable program code using task gates
JP2984641B2 (en) 1998-01-30 1999-11-29 アイ・ヴィ・アイ株式会社 Recording medium recording a security system and security program
KR100524055B1 (en) * 1998-03-05 2005-10-19 삼성전자주식회사 Computer system having the function of remote waking up and method for remote waking up the computer system
US6269447B1 (en) 1998-07-21 2001-07-31 Raytheon Company Information security analysis system
EP1237102A4 (en) 1999-11-17 2003-01-08 Ken Millennium Inc Security exchange assisting system and security exchange assisting method, and computer-readable recorded medium where program is recorded
US6636975B1 (en) * 1999-12-15 2003-10-21 Identix Incorporated Accessing a secure resource using certificates bound with authentication information
JP2001282625A (en) 2000-03-31 2001-10-12 Fujitsu Ltd Security management system and security management program storage medium
US20040003266A1 (en) 2000-09-22 2004-01-01 Patchlink Corporation Non-invasive automatic offsite patch fingerprinting and updating system and method
JP2002288136A (en) 2001-03-26 2002-10-04 Foundation For Nara Institute Of Science & Technology User information controlling device, user information controlling method, user information controlling program and storage medium with the program recorded thereon
KR100461990B1 (en) 2001-07-03 2004-12-14 주식회사 소프트그램 The method of servicing information capable for protecting personal information
JP2003058508A (en) 2001-08-13 2003-02-28 Sony Corp Personal identification device, personal identification method, and computer program
JP2003085048A (en) 2001-09-11 2003-03-20 Sony Corp Backup data management system, backup data management method, and information processing device, and computer program
WO2003040945A1 (en) 2001-11-02 2003-05-15 Premedics, Inc. System and method for monitoring and ensuring proper life safety equipment maintenance, operation, and program implementation
JP2003167877A (en) 2001-12-04 2003-06-13 Mitsubishi Electric Corp Information providing system
JP2003203051A (en) 2002-01-07 2003-07-18 Yamatake Corp Security measure execution device and method, security measure execution program, and storage medium with the program stored therein
JP3680034B2 (en) 2002-03-20 2005-08-10 株式会社東芝 User switching method for use in an information processing apparatus and the apparatus
JP2003316650A (en) 2002-04-18 2003-11-07 Internatl Business Mach Corp <Ibm> Computer system, portable information equipment, security switching method and program
US7428590B2 (en) * 2002-06-10 2008-09-23 Akonix Systems, Inc. Systems and methods for reflecting messages associated with a target protocol within a network
JP4213411B2 (en) 2002-06-24 2009-01-21 株式会社リコー Authentication system, a program for executing the authentication method and a method in a computer
JP2004054706A (en) 2002-07-22 2004-02-19 Sofutekku:Kk Security risk management system, program, and recording medium thereof
JP3767561B2 (en) 2002-09-02 2006-04-19 ソニー株式会社 Device authentication apparatus, a device authentication method, and an information processing apparatus, information processing method, and computer program
JP2004211576A (en) 2002-12-27 2004-07-29 Sanden Corp Swash plate compressor
EP1661025A4 (en) 2003-08-11 2010-05-26 Chorus Systems Inc Systems and methods for creation and use of an adaptive reference model

Patent Citations (80)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5050213A (en) * 1986-10-14 1991-09-17 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US5163147A (en) * 1989-08-31 1992-11-10 Kabushiki Kaisha Toshiba Computer system with file security function
US5251294A (en) * 1990-02-07 1993-10-05 Abelow Daniel H Accessing, assembling, and using bodies of information
US6418424B1 (en) * 1991-12-23 2002-07-09 Steven M. Hoffberg Ergonomic man-machine interface incorporating adaptive pattern recognition based control system
US5812688A (en) * 1992-04-27 1998-09-22 Gibson; David A. Method and apparatus for using visual images to mix sound
US5610981A (en) * 1992-06-04 1997-03-11 Integrated Technologies Of America, Inc. Preboot protection for a data security system with anti-intrusion capability
US5361359A (en) * 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer
US6658464B2 (en) * 1994-05-31 2003-12-02 Richard R. Reisman User station software that controls transport, storage, and presentation of content from a remote source
US5778068A (en) * 1995-02-13 1998-07-07 Eta Technologies Corporation Personal access management system
US6253193B1 (en) * 1995-02-13 2001-06-26 Intertrust Technologies Corporation Systems and methods for the secure transaction management and electronic rights protection
US5694472A (en) * 1995-02-13 1997-12-02 Eta Technologies Corporation Personal access management system
US5949876A (en) * 1995-02-13 1999-09-07 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US5604800A (en) * 1995-02-13 1997-02-18 Eta Technologies Corporation Personal access management system
US5910987A (en) * 1995-02-13 1999-06-08 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5915019A (en) * 1995-02-13 1999-06-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5917912A (en) * 1995-02-13 1999-06-29 Intertrust Technologies Corporation System and methods for secure transaction management and electronic rights protection
US6427140B1 (en) * 1995-02-13 2002-07-30 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6185683B1 (en) * 1995-02-13 2001-02-06 Intertrust Technologies Corp. Trusted and secure techniques, systems and methods for item delivery and execution
US6237786B1 (en) * 1995-02-13 2001-05-29 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6671813B2 (en) * 1995-06-07 2003-12-30 Stamps.Com, Inc. Secure on-line PC postage metering system
US6366967B1 (en) * 1995-06-22 2002-04-02 Datascape, Inc. Open network system for i/o operation including a common gateway interface and an extended open network protocol with non-standard i/o devices utilizing device and identifier for operation to be performed with device
US6006328A (en) * 1995-07-14 1999-12-21 Christopher N. Drake Computer software authentication, protection, and security system
US5878210A (en) * 1995-08-10 1999-03-02 Samsung Electronics Co., Ltd. Personal computer having a security function, a method of implementing the security function, and methods of installing and detaching a security device to/from a computer
US5941947A (en) * 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
US5696822A (en) * 1995-09-28 1997-12-09 Symantec Corporation Polymorphic virus detection module
US5859966A (en) * 1995-10-10 1999-01-12 Data General Corporation Security system for computer systems
US5991735A (en) * 1996-04-26 1999-11-23 Be Free, Inc. Computer program apparatus for determining behavioral profile of a computer user
US6336135B1 (en) * 1996-05-24 2002-01-01 International Business Machines Corporation Gateway for converting synchronous client/server protocols into asynchronous messaging protocols and storing session state information at the client
US6026379A (en) * 1996-06-17 2000-02-15 Verifone, Inc. System, method and article of manufacture for managing transactions in a high availability system
US5943424A (en) * 1996-06-17 1999-08-24 Hewlett-Packard Company System, method and article of manufacture for processing a plurality of transactions from a single initiation point on a multichannel, extensible, flexible architecture
US6253027B1 (en) * 1996-06-17 2001-06-26 Hewlett-Packard Company System, method and article of manufacture for exchanging software and configuration data over a multichannel, extensible, flexible architecture
US5828840A (en) * 1996-08-06 1998-10-27 Verifone, Inc. Server for starting client application on client if client is network terminal and initiating client application on server if client is non network terminal
US5943422A (en) * 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US6292569B1 (en) * 1996-08-12 2001-09-18 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US6304915B1 (en) * 1996-09-26 2001-10-16 Hewlett-Packard Company System, method and article of manufacture for a gateway system architecture with system administration information accessible from a browser
US5920861A (en) * 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures
US6138119A (en) * 1997-02-25 2000-10-24 Intertrust Technologies Corp. Techniques for defining, using and manipulating rights management data structures
US5964889A (en) * 1997-04-16 1999-10-12 Symantec Corporation Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator
US6587836B1 (en) * 1997-09-26 2003-07-01 Worldcom, Inc. Authentication and entitlement for users of web based data management programs
US6714962B1 (en) * 1997-10-28 2004-03-30 Microsoft Corporation Multi-user server application architecture with single-user object tier
US6334189B1 (en) * 1997-12-05 2001-12-25 Jamama, Llc Use of pseudocode to protect software from unauthorized use
US6088799A (en) * 1997-12-11 2000-07-11 International Business Machines Corporation Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
US6151606A (en) * 1998-01-16 2000-11-21 Visto Corporation System and method for using a workspace data manager to access, manipulate and synchronize network data
US6618806B1 (en) * 1998-04-01 2003-09-09 Saflink Corporation System and method for authenticating users in a computer network
US6298445B1 (en) * 1998-04-30 2001-10-02 Netect, Ltd. Computer security
US6282546B1 (en) * 1998-06-30 2001-08-28 Cisco Technology, Inc. System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
US6295639B1 (en) * 1998-09-01 2001-09-25 Aidministrator Nederland B.V. Securely accessing a file system of a remote server computer
US6640229B1 (en) * 1998-09-18 2003-10-28 Tacit Knowledge Systems, Inc. Automatic management of terms in a user profile in a knowledge management system
US6647384B2 (en) * 1998-09-18 2003-11-11 Tacit Knowledge Systems, Inc. Method and apparatus for managing user profiles including identifying users based on matched query term
US6158010A (en) * 1998-10-28 2000-12-05 Crosslogix, Inc. System and method for maintaining security in a distributed computer network
US6625150B1 (en) * 1998-12-17 2003-09-23 Watchguard Technologies, Inc. Policy engine architecture
US6574737B1 (en) * 1998-12-23 2003-06-03 Symantec Corporation System for penetrating computer or computer network
US6266773B1 (en) * 1998-12-31 2001-07-24 Intel. Corp. Computer security system
US6400996B1 (en) * 1999-02-01 2002-06-04 Steven M. Hoffberg Adaptive pattern recognition based control system and method
US6381589B1 (en) * 1999-02-16 2002-04-30 Neopost Inc. Method and apparatus for performing secure processing of postal data
US6687375B1 (en) * 1999-06-02 2004-02-03 International Business Machines Corporation Generating user-dependent keys and random numbers
US7346929B1 (en) * 1999-07-29 2008-03-18 International Business Machines Corporation Method and apparatus for auditing network security
US6553412B1 (en) * 1999-09-10 2003-04-22 Avantgo, Inc. System, method, and computer program product for web content aggregation and development, and web content delivery to clients
US6725382B1 (en) * 1999-12-06 2004-04-20 Avaya Technology Corp. Device security mechanism based on registered passwords
US20040250112A1 (en) * 2000-01-07 2004-12-09 Valente Luis Filipe Pereira Declarative language for specifying a security policy
US6779120B1 (en) * 2000-01-07 2004-08-17 Securify, Inc. Declarative language for specifying a security policy
US20030014636A1 (en) * 2000-02-01 2003-01-16 Ahlbrand Stephen D Physical identification and computer security apparatus and method
US20030041243A1 (en) * 2000-03-02 2003-02-27 Olguin Nelson Eric Ramirez Security system against illegal use and copy of eletronic data
US20040000326A1 (en) * 2000-03-29 2004-01-01 Ziemins Uldis A. Wafer edge cleaning utilizing polish pad material
US20020026605A1 (en) * 2000-04-06 2002-02-28 Terry Robert F. System and method for real time monitoring and control of a computer machine environment and configuration profile
US20020143921A1 (en) * 2001-04-03 2002-10-03 Yann Stephan Bus function authentication method, apparatus and computer program
US6751626B2 (en) * 2001-05-03 2004-06-15 International Business Machines Corporation Method, system, and program for mining data in a personal information manager database
US7231637B1 (en) * 2001-07-26 2007-06-12 Mcafee, Inc. Security and software testing of pre-release anti-virus updates on client and transmitting the results to the server
US20080115204A1 (en) * 2001-09-07 2008-05-15 Jon Ramsey Intergrated computer security management system and method
US20030188194A1 (en) * 2002-03-29 2003-10-02 David Currie Method and apparatus for real-time security verification of on-line services
US20030200308A1 (en) * 2002-04-23 2003-10-23 Seer Insight Security K.K. Method and system for monitoring individual devices in networked environments
US20030212779A1 (en) * 2002-04-30 2003-11-13 Boyter Brian A. System and Method for Network Security Scanning
US20040128252A1 (en) * 2002-10-09 2004-07-01 Sony Corporation Information processing device, contents distribution server, license server, and method and computer program
US7353539B2 (en) * 2002-11-04 2008-04-01 Hewlett-Packard Development Company, L.P. Signal level propagation mechanism for distribution of a payload to vulnerable systems
US20040088581A1 (en) * 2002-11-04 2004-05-06 Brawn John Melvin Signal level propagation mechanism for distribution of a payload to vulnerable systems
US20040123157A1 (en) * 2002-12-13 2004-06-24 Wholesecurity, Inc. Method, system, and computer program product for security within a global computer network
US20050097199A1 (en) * 2003-10-10 2005-05-05 Keith Woodard Method and system for scanning network devices
US7581249B2 (en) * 2003-11-14 2009-08-25 Enterasys Networks, Inc. Distributed intrusion response system
US20050193427A1 (en) * 2004-02-26 2005-09-01 Pramod John Secure enterprise network
US20070180490A1 (en) * 2004-05-20 2007-08-02 Renzi Silvio J System and method for policy management

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8255995B2 (en) * 2005-12-16 2012-08-28 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US20070143848A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing computer and network security for polymorphic attacks
US20070143850A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US20070256127A1 (en) * 2005-12-16 2007-11-01 Kraemer Jeffrey A Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US9286469B2 (en) 2005-12-16 2016-03-15 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US8495743B2 (en) 2005-12-16 2013-07-23 Cisco Technology, Inc. Methods and apparatus providing automatic signature generation and enforcement
US20100242111A1 (en) * 2005-12-16 2010-09-23 Kraemer Jeffrey A Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US7882560B2 (en) * 2005-12-16 2011-02-01 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US8413245B2 (en) 2005-12-16 2013-04-02 Cisco Technology, Inc. Methods and apparatus providing computer and network security for polymorphic attacks
US20070143847A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing automatic signature generation and enforcement
WO2007130332A3 (en) * 2006-05-01 2008-08-28 Cisco Tech Inc Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US20110047369A1 (en) * 2006-09-19 2011-02-24 Cohen Alexander J Configuring Software Agent Security Remotely
US20080072032A1 (en) * 2006-09-19 2008-03-20 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Configuring software agent security remotely
US8671087B2 (en) 2007-12-18 2014-03-11 Mcafee, Inc. System, method and computer program product for scanning and indexing data for different purposes
US8086582B1 (en) * 2007-12-18 2011-12-27 Mcafee, Inc. System, method and computer program product for scanning and indexing data for different purposes
US9804747B2 (en) 2008-09-30 2017-10-31 Microsoft Technology Licensing, Llc Techniques to manage access to organizational information of an entity
US8972571B2 (en) 2010-01-26 2015-03-03 Tenable Network Security, Inc. System and method for correlating network identities and addresses
US8438270B2 (en) 2010-01-26 2013-05-07 Tenable Network Security, Inc. System and method for correlating network identities and addresses
US20110185055A1 (en) * 2010-01-26 2011-07-28 Tenable Network Security, Inc. System and method for correlating network identities and addresses
US20110185431A1 (en) * 2010-01-28 2011-07-28 Tenable Network Security, Inc. System and method for enabling remote registry service security audits
US8302198B2 (en) * 2010-01-28 2012-10-30 Tenable Network Security, Inc. System and method for enabling remote registry service security audits
US20140013436A1 (en) * 2010-01-28 2014-01-09 Tenable Network Security, Inc. System and method for enabling remote registry service security audits
US8839442B2 (en) * 2010-01-28 2014-09-16 Tenable Network Security, Inc. System and method for enabling remote registry service security audits
US20110191836A1 (en) * 2010-02-02 2011-08-04 Indeni, Ltd. Apparatus For Real-Time Management Of The Performance Of Security Components Of A Network System
US9460045B2 (en) 2010-02-02 2016-10-04 Indeni, Ltd. Apparatus for real-time management of the performance of security components of a network system
US20110231935A1 (en) * 2010-03-22 2011-09-22 Tenable Network Security, Inc. System and method for passively identifying encrypted and interactive network sessions
US8707440B2 (en) 2010-03-22 2014-04-22 Tenable Network Security, Inc. System and method for passively identifying encrypted and interactive network sessions
US8549650B2 (en) 2010-05-06 2013-10-01 Tenable Network Security, Inc. System and method for three-dimensional visualization of vulnerability and asset data
US9032013B2 (en) * 2010-10-29 2015-05-12 Microsoft Technology Licensing, Llc Unified policy over heterogenous device types
US9871824B2 (en) 2010-10-29 2018-01-16 Microsoft Technology Licensing, Llc Unified policy over heterogenous device types
US20120110059A1 (en) * 2010-10-29 2012-05-03 Microsoft Corporation Unified policy over heterogenous device types
US9794223B2 (en) 2012-02-23 2017-10-17 Tenable Network Security, Inc. System and method for facilitating data leakage and/or propagation tracking
US9367707B2 (en) 2012-02-23 2016-06-14 Tenable Network Security, Inc. System and method for using file hashes to track data leakage and document propagation in a network
US9043920B2 (en) 2012-06-27 2015-05-26 Tenable Network Security, Inc. System and method for identifying exploitable weak points in a network
US9860265B2 (en) 2012-06-27 2018-01-02 Tenable Network Security, Inc. System and method for identifying exploitable weak points in a network
US9088606B2 (en) 2012-07-05 2015-07-21 Tenable Network Security, Inc. System and method for strategic anti-malware monitoring
US9467464B2 (en) 2013-03-15 2016-10-11 Tenable Network Security, Inc. System and method for correlating log data to discover network vulnerabilities and assets
US20150172140A1 (en) * 2013-12-18 2015-06-18 Thomson Reuters Global Resources (Trgr) System and method for dynamically scheduling network scanning tasks

Also Published As

Publication number Publication date Type
US7752671B2 (en) 2010-07-06 grant
CA2582390A1 (en) 2006-04-13 application
WO2006038210A3 (en) 2007-08-02 application
WO2006038210B1 (en) 2007-10-04 application
JP2008516308A (en) 2008-05-15 application
US20100235920A1 (en) 2010-09-16 application
WO2006038210A2 (en) 2006-04-13 application
EP1805641A4 (en) 2011-11-23 application
US8544099B2 (en) 2013-09-24 grant
EP1805641A2 (en) 2007-07-11 application
US20060075128A1 (en) 2006-04-06 application
US8566939B2 (en) 2013-10-22 grant
EP1805641B1 (en) 2015-09-09 grant

Similar Documents

Publication Publication Date Title
Schnackengerg et al. Cooperative intrusion traceback and response architecture (CITRA)
Scarfone et al. Guide to intrusion detection and prevention systems (idps)
US8065712B1 (en) Methods and devices for qualifying a client machine to access a network
US7647622B1 (en) Dynamic security policy through use of empirical security events
US7832006B2 (en) System and method for providing network security
US7895651B2 (en) Content tracking in a network security system
US7712137B2 (en) Configuring and organizing server security information
US20100212010A1 (en) Systems and methods that detect sensitive data leakages from applications
US20040039921A1 (en) Method and system for detecting rogue software
US7533131B2 (en) System and method for pestware detection and removal
US20070028291A1 (en) Parametric content control in a network security system
US8272058B2 (en) Centralized timed analysis in a network security system
US20060015715A1 (en) Automatically protecting network service from network attack
US20100100962A1 (en) Internet security dynamics assessment system, program product, and related methods
US20110023115A1 (en) Host intrusion prevention system using software and user behavior analysis
US20030212779A1 (en) System and Method for Network Security Scanning
US20090328222A1 (en) Mapping between users and machines in an enterprise security assessment sharing system
US20070118669A1 (en) Domain name system security network
US7480683B2 (en) System and method for heuristic analysis to identify pestware
US20060085528A1 (en) System and method for monitoring network communications for pestware
US20100043066A1 (en) Multiple security layers for time-based network admission control
US7890627B1 (en) Hierarchical statistical model of internet reputation
US20070028110A1 (en) Content extractor and analysis system
US8108923B1 (en) Assessing risk based on offline activity history
US20030110392A1 (en) Detecting intrusions

Legal Events

Date Code Title Description
AS Assignment

Owner name: PROMISEC LTD., ISRAEL

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SUCHOWSKI, RON SHAY;KOTLER, HILIK;REEL/FRAME:018430/0734

Effective date: 20060404

AS Assignment

Owner name: PROMISEC LTD.,ISRAEL

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SUCHOWSKI, RON SHAY;KOTLER, HILIK;REEL/FRAME:024377/0564

Effective date: 20060404

Owner name: PROMISEC LTD., ISRAEL

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SUCHOWSKI, RON SHAY;KOTLER, HILIK;REEL/FRAME:024377/0564

Effective date: 20060404

FPAY Fee payment

Year of fee payment: 4